General

  • Target

    153474a421555efec96bb2a8916c487831cbf7f7bdc2b0d38a8195927d44328c

  • Size

    11KB

  • MD5

    d4fc31567a36d5fb4ef75f83e8236cdb

  • SHA1

    8e56bce590fc291f8f58b641797e1e42ede59d67

  • SHA256

    153474a421555efec96bb2a8916c487831cbf7f7bdc2b0d38a8195927d44328c

  • SHA512

    36edcb83d12ecee600704fb547cb0815717b15397ff13705554fc5557efe897596811132f24cb17587f78a6d130a172be274b68b50b05bbaf618659b6078c4fe

  • SSDEEP

    192:moCuzlnPbRLMsbNO3Dvook9JsphA3RY6qTYZXhTHDbmpZPSuzSVtJ2eV5f50Ik8L:3CuzhPb9TbNO3DwoIJsHA3RY7QXhEZjc

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked by JmRh

C2

0.tcp.eu.ngrok.io:15422

Mutex

255adf5996e3bf23b41adff1252970bf

Attributes
  • reg_key

    255adf5996e3bf23b41adff1252970bf

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 153474a421555efec96bb2a8916c487831cbf7f7bdc2b0d38a8195927d44328c
    .zip

    Password: infected

  • 4a5fdda9ee07e884e1d89612b56a932acb9c812b72cccacde885da0f9b4eab31.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections