General

  • Target

    14f609646adc449fbb8f358e7aefcdc343468d82bb913dcd4d50cbb01c6b3312

  • Size

    16KB

  • MD5

    fbc0a2e7d8e8cac1fa4867748eecf3ca

  • SHA1

    91c655584e6393e74a831b461747beea55eb496c

  • SHA256

    14f609646adc449fbb8f358e7aefcdc343468d82bb913dcd4d50cbb01c6b3312

  • SHA512

    daf7cf9ab1ed35e1de42cabe247efca5b6ff386c13fb9bed943cfb964b0e8db9a6c73cf19a03fac763ba4ae7bd7b49a801768236b11ebf36384b285979fada3b

  • SSDEEP

    384:Mqt+1YOaoxMpbFymPCxr3u2hwW3xchvYUTshTnG+ObnbrQRsLojif:MqtyYzrrjq13u2hwcxevpYNG+YM2Eif

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:15451

Mutex

1026a75483502437f7df6cd87292f363

Attributes
  • reg_key

    1026a75483502437f7df6cd87292f363

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 14f609646adc449fbb8f358e7aefcdc343468d82bb913dcd4d50cbb01c6b3312
    .zip

    Password: infected

  • 55445ef6261ed803ea65e9cb491d50a6884903f8301da5ca1b9449dad4de8612.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections