General

  • Target

    7ba9f8f6c6350f943cdbe4eb25816b70_NeikiAnalytics

  • Size

    93KB

  • MD5

    7ba9f8f6c6350f943cdbe4eb25816b70

  • SHA1

    1105a8a4ff3256f7b97beea28ff81d7dc19a5579

  • SHA256

    5b174c5a8243e4c1b569ed56c0b99a9a007b9d03394196d0093f6e25d3ad7e08

  • SHA512

    e65868f562f836b3a79f56ff44502734c5f7cc6232d19ed61764bf30e3267e7632468399e3ed605835c31d089d6f550fd7a463f30287bbcbd08e95d8f52394e6

  • SSDEEP

    768:vY33UnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3LsG4:WUxOx6baIa9RZj00ljEwzGi1dDXDCgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

90cdc4299e3838b5249c33e1c7a2dd25

Attributes
  • reg_key

    90cdc4299e3838b5249c33e1c7a2dd25

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7ba9f8f6c6350f943cdbe4eb25816b70_NeikiAnalytics
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections