General

  • Target

    d6db7db7e2f5c20f0a77fffac60644a2abdcc5e2b39c3ba9aed0df8035666a20

  • Size

    37KB

  • MD5

    1032ae89d66a947ec8f442d14bb95018

  • SHA1

    48a7e5818bfa3ab52d873fe14d28024a072485c7

  • SHA256

    d6db7db7e2f5c20f0a77fffac60644a2abdcc5e2b39c3ba9aed0df8035666a20

  • SHA512

    9ef126fda53f0813d9ac75379dfa5e9e070bd21e5487283c029e2ef9b77f79915c5abd04caa26bbb6611838f0622861d7e372c3c12e635215dc2452bcba894b7

  • SSDEEP

    384:8LYraoixJ9l7OHg1WykrFV3pk8emT2JrAF+rMRTyN/0L+EcoinblneHQM3epzXQJ:fr+R1NkrFV6NmArM+rMRa8NuG7t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

19.ip.gl.ply.gg:44815

Mutex

e70468da2d9724fb5699892dad030028

Attributes
  • reg_key

    e70468da2d9724fb5699892dad030028

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d6db7db7e2f5c20f0a77fffac60644a2abdcc5e2b39c3ba9aed0df8035666a20
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections