General

  • Target

    Excellent.exe

  • Size

    37KB

  • MD5

    2f5c65c71520736c6abe90d8a1d3c3d0

  • SHA1

    5650334ef1722a1c6e952c57097d86ce3d6cfc89

  • SHA256

    886f5410fc3e78d12f7ee8825acd09a1dbb5d3cf021a48079fa36d2057e5fe7f

  • SHA512

    e6dd4a971afd6c534762d66b078d4699fb3751e8ec737e06ce4e699d5281850d85bfd437590b6b5923a8d8e821e1bfcd47f3a09377715af6514f5dba14958572

  • SSDEEP

    384:SNaIiutjtD+P3V+y0bnu7ytflgs+SiVrAF+rMRTyN/0L+EcoinblneHQM3epzXOK:sVmV10bnu7ytCVSyrM+rMRa8Nucut

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

svchost

C2

2.tcp.eu.ngrok.io:17435

Mutex

4d752af2f3a6a8b51254dbf4f8880fcb

Attributes
  • reg_key

    4d752af2f3a6a8b51254dbf4f8880fcb

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Excellent.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections