Resubmissions

15/06/2024, 19:31

240615-x8hewawflj 10

15/06/2024, 19:27

240615-x6bjjswern 10

General

  • Target

    Payload.exe

  • Size

    82KB

  • MD5

    237f9636db52d6b08eee6cbbec56143f

  • SHA1

    7ede293e07b78e3ef264a466e42b6373edc10e5b

  • SHA256

    27856d111e7e43a446fd6f696854f1361084e48a500f816a0f487a329867eee8

  • SHA512

    346ed743a3257d9bf0968f49716a9a9770f8b8282dfb4b59c9e873c0cd9d907709481011d767563abc5eaf23bab1370f83964b27f10f3be28ed122ef05cf752a

  • SSDEEP

    1536:dV/zDnWNcVcDcGDGwsNMDmaXExI3pmmmfIRCwtUhZX+1colcmS4QElRd4m+rlIzm:/zDndCgGDGwsNMDzXExI3pmxIRCx

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Zed

C2

0.tcp.eu.ngrok.io:4332

Mutex

4a8cd783088b8bd7ef5d36aae078de19

Attributes
  • reg_key

    4a8cd783088b8bd7ef5d36aae078de19

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections