General

  • Target

    Primordial.exe

  • Size

    93KB

  • MD5

    dcc0946afc440b8b0a0c4ec24ac30db8

  • SHA1

    a09b41ac539fd3f362b2ecfe5f07caabfcf7a28b

  • SHA256

    0088d42558db8697390fe888cc6bbb230fdcaf726069a11cc28a44595eb38f18

  • SHA512

    558d4276448a4844815c5352df8293e25c9b1d55290deae1b282268acb38a4e807b18497d5930e9413c8332ea9144e1724ed965d84f088e98d34db31b67a2fe1

  • SSDEEP

    768:sY3zUnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3FsGb:vUxOx6baIa9RZj00ljEwzGi1dDVDfgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Timer

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

0014febafea44ef3e1f627812f37e020

Attributes
  • reg_key

    0014febafea44ef3e1f627812f37e020

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Primordial.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections