General

  • Target

    408cd96c13aeafc4ee9d9aaec8ff5d664798949a1a61150d21204b31d8b04da1

  • Size

    235KB

  • MD5

    b601d5197dd63408ede7d1a93f161b7a

  • SHA1

    95d59f22024e2b28ff21f416940cf00609af5bbd

  • SHA256

    408cd96c13aeafc4ee9d9aaec8ff5d664798949a1a61150d21204b31d8b04da1

  • SHA512

    4c6eb670969464e0280fa7fdfab2bc4d4c66b69cf61c6115331e573488c46e51d28047a0987af7f0784164a5be70aae656586ee205906ddd29ce4c7ac0f19bd2

  • SSDEEP

    6144:DlziNwNG0a2KCVgNhue2kaylyBBR4KtXoDKaO0M7nMPC46Z4fInLcgQI4khO5nH:DlONwNtK3NyyloR4Kt4DKaxUnMP36GIi

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

brole.duckdns.org:8080

Mutex

815453fb31ea3245ed3ced2c46c4f912

Attributes
  • reg_key

    815453fb31ea3245ed3ced2c46c4f912

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 408cd96c13aeafc4ee9d9aaec8ff5d664798949a1a61150d21204b31d8b04da1
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections