General

  • Target

    TEST.exe

  • Size

    93KB

  • MD5

    1562e1bc62ee978d86d5b4e6289399fb

  • SHA1

    cd3f4af69ead6c9c9f2ca1626fc3449b25dd187b

  • SHA256

    ddfcc444ff890158b69e8a89894a4554fb5c1859135bf3d4d57750c2f6602a5f

  • SHA512

    f29a724f8114c3f0cfc02dddcdd114f53307f14a33e3ecd4685a88d3cf58c226939c32f3acf82df09268dc3beee192d41f0978bf0fe729c318d9aa5f8fb2822b

  • SSDEEP

    1536:somNCfSGGCokT3Ce7Z6wZ9ejEwzGi1dDcCbrgS:so1T3Ce7Z/Tni1dhk

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Nigga

C2

hakim32.ddns.net:2000

teaching-wireless.gl.at.ply.gg:39289

Mutex

35bf4b301fdcba49be8f44192bd8bc64

Attributes
  • reg_key

    35bf4b301fdcba49be8f44192bd8bc64

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • TEST.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections