General

  • Target

    gfrsdgfdgdfgfdgdfgfdg.exe

  • Size

    93KB

  • MD5

    9648ab54eb3b5472922c605be404aff3

  • SHA1

    9cd4b208d696b5e7dcbcd33f795f749aef514fc7

  • SHA256

    8a7b28e3c1729db2234fe7ef5a9464c19e5c02a95370e17b4171f92d658fe867

  • SHA512

    89281ba1dbce2d7ada52c0cb43bd6cbd46ce0e858195fb986d3c8fbbca32d73bfb319dfd260405074fdeffed1dc5ce23bcd42f28e3e86f2ebfccbf1d6107e400

  • SSDEEP

    768:AY3n+CasdE1chQlnLY4dUz7ar6D6XKDsZ/of6EqXxrjEtCdnl2pi1Rz4Rk3zsGdt:/+HsiPnLYV1UVoIjEwzGi1dD/DjgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Retard

C2

hakim32.ddns.net:2000

teaching-wireless.gl.at.ply.gg:39289

Mutex

054895043cd086a18a724c73aaff01b5

Attributes
  • reg_key

    054895043cd086a18a724c73aaff01b5

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • gfrsdgfdgdfgfdgdfgfdg.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections