General

  • Target

    e89cf87063056b610e4d8080760d180e4417060c0a4003ba59c6514a92aafbdd

  • Size

    10KB

  • MD5

    a31b39c1c47bed5421042422760d9493

  • SHA1

    a761b7ecb8a72de3e95a34b6b730f19ba0a07b65

  • SHA256

    e89cf87063056b610e4d8080760d180e4417060c0a4003ba59c6514a92aafbdd

  • SHA512

    af8f1520c2a25cd69c7442d830c0902413af00403faab37378df18c25016a6eacfa7591ffa865347c31c156cd433d3f6e2b38ef41feaa5d8f513bf872ab7bf48

  • SSDEEP

    192:kuhKv+vtuAM+VLYXgoQRXY6GMoXz4cxsV84LPNTm356wjVkbQJBGXNMiGoNqyY0G:kuhKgQn+VsgZlwa84zo45QnAE9Luhpo

Score
10/10

Malware Config

Extracted

Family

njrat

C2

googleservices.ddnsfree.com:58989

Mutex

7fad57f20f434fbea4

Attributes
  • reg_key

    7fad57f20f434fbea4

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e89cf87063056b610e4d8080760d180e4417060c0a4003ba59c6514a92aafbdd
    .zip

    Password: infected

  • 12f378e81fd46ac069f032a9405dbec88a40449848c6fd0c25de3e6279df17be.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections