General

  • Target

    painkiller.exe

  • Size

    46KB

  • MD5

    0025f1a8cf3bb3bace6659551b61e35b

  • SHA1

    6b66c657f35faf83b74babb7e2f0fc064f93f7c8

  • SHA256

    fbb36bd481733516d1f0d8a98c701821b4861c4547d39bf76da613d8897cd131

  • SHA512

    b641088128d186fb015dd294fec2b289d1758e7a0ee56b505ccf9a16495fd673bdd44139b9d5acc58640555d1426106a1b7f07858cd8036900608e7aa9351073

  • SSDEEP

    384:VBjoUiF+bK7FmpE8QyEfOCfJ+fHiXyrAF+rMRTyN/0L+EcoinblneHQM3epzXuaH:HN2n8LEfOCAviirM+rMRa8NuratdcG6

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

LOX

C2

4.tcp.eu.ngrok.io:18227

Mutex

28bd46a4b7f2595d232457bf9895d728

Attributes
  • reg_key

    28bd46a4b7f2595d232457bf9895d728

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • painkiller.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections