General

  • Target

    Realtek Driver Manager.exe

  • Size

    37KB

  • MD5

    0012df83cc6e5d6f89ac3832f1258ea7

  • SHA1

    87a5fc9d3dfd8493b2d592db50150c2238b6fb42

  • SHA256

    6c15381bbc5005025da5159f4906419923154b6fc228b102b089b45a45c47f12

  • SHA512

    6959a10798198144f8727857811ad260a4f638dcdb27896e456d6fa5292a60be2ace4615dfe3a6da2c8721c290158d47111fba8fc8aba9a51c317d68fd2ac77b

  • SSDEEP

    768:nnYl2KhjIwdpszDJadScrM+rMRa8Nukat:nwIwd+nJaMv+gRJNL

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Realtek Driver Manager

C2

4.tcp.eu.ngrok.io:10948

Mutex

403a015a0b4f73144eee812a4e92c48a

Attributes
  • reg_key

    403a015a0b4f73144eee812a4e92c48a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Realtek Driver Manager.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections