General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    3320c2fffbb973c5acac551b12201b42

  • SHA1

    b864567095a5b6a191581d62683933278a70bffc

  • SHA256

    7c8581b17072d3e4936d03cb43e74ac7edbfb72e242797bacaf6f4adcd6a6cd9

  • SHA512

    5b3acc3674ce2e0372fab10d639a41e53929d48d4e86ea85ca34e6d52c748d5d9410b36d260ca713d74782bffa53bcb6a2f475a2a938e6ab3f81b4f50a6daf78

  • SSDEEP

    768:pzPpUKt1ManMr3Z2NaDyBmH3UekSNemwFvfu0YMDHPsbL7XJSxI3pmtm:pzy4DnFNaDyByfDzwsNMDmXExI3pmtm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victima Romana

C2

0.tcp.eu.ngrok.io:4332

Mutex

ac462f4892adc18d9ebb09972e8503ad

Attributes
  • reg_key

    ac462f4892adc18d9ebb09972e8503ad

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections