General

  • Target

    ce1e4aaf1a363277d2fead4a27d0a0c44c833218f0d1aac32aaa9d64ad34a2c2

  • Size

    65KB

  • MD5

    4c675152218de8727d0350d13b4be346

  • SHA1

    2b9e50c82dfcb70bcf0c02717039a581995ea22b

  • SHA256

    ce1e4aaf1a363277d2fead4a27d0a0c44c833218f0d1aac32aaa9d64ad34a2c2

  • SHA512

    f3cd21ab5513181e88ac947bec21533c47195fedb78baa65bda17e217d9efba2d90306bbcbbe3ddd5051864154f38068de750fbb69b3cd7e61fccd7983b77a42

  • SSDEEP

    1536:MlCR4csoN36tLQviFw1oWUSBnvAMfLteF3nLrB9z3n9aF9b5S9vM:MlCR4csoN36tLQviFChnBn/fWl9zNaFz

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:60000

Mutex

winlogon.exe

Attributes
  • reg_key

    winlogon.exe

  • splitter

    |Ghost|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ce1e4aaf1a363277d2fead4a27d0a0c44c833218f0d1aac32aaa9d64ad34a2c2
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections