General

  • Target

    vps ratka.exe

  • Size

    37KB

  • MD5

    44c8cc31810ff4c8d4de6e8cbc5f405c

  • SHA1

    e2f6a8c904836badba27c74a8e651dca3b653717

  • SHA256

    3f38864b70705cd572448169aeda5df35900d42f15cfbacad3ecd2d1dda8601a

  • SHA512

    a309eeec40e6be76f56c806e33d30556d30d41297f564e43236f021474414bd5e61561e48a9db22061ed04d2f81606a09615609d5422805bf5516eb3757fba88

  • SSDEEP

    384:UeLx1kit8Zf5W9cTYXyc/bBM0izvncnPMInrAF+rMRTyN/0L+EcoinblneHQM3ev:5LxKjjTYic/be0PMmrM+rMRa8NutHt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

63.141.252.134:12550

Mutex

b655d0f638245c20a3d000a0a56ea9e2

Attributes
  • reg_key

    b655d0f638245c20a3d000a0a56ea9e2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • vps ratka.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections