General

  • Target

    8949112a3e17e2dc4a24947efa28f504ec45d34408c42b545a85d07f54effea1

  • Size

    16KB

  • MD5

    93ad84110f7464cb4585c49e960afb46

  • SHA1

    7e7dcd93ef494cbb46c1213a2c8fc0026f8c72a9

  • SHA256

    8949112a3e17e2dc4a24947efa28f504ec45d34408c42b545a85d07f54effea1

  • SHA512

    6f6b0f9ed9776a834b084f32056174352eba55bf8a511b94a3d3064980663fee4e651164f65cd16a11a70739c93bc2c1923a2350e8185610f74998d5711e02ac

  • SSDEEP

    384:IMf7DqJOwbwEjY7omqVSEMXY6XmaGzZb04YYUgsr5T/:Ff7DqJOwE0JVSEMo9aGh04YfP5z

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:15184

Mutex

c502ee9893aaa40a8d929234e5c9b5c8

Attributes
  • reg_key

    c502ee9893aaa40a8d929234e5c9b5c8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8949112a3e17e2dc4a24947efa28f504ec45d34408c42b545a85d07f54effea1
    .zip

    Password: infected

  • 502869ac1880a412f2a5d8dae93b506d98acb48f10cdb32bcdc3517fc9721711.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections