General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    62888d428cc4f58ab5e8d4a3becb83ba

  • SHA1

    f36d4d96f3bccfe244bd65290ce611b1db99aac5

  • SHA256

    72e094db601af42d73a7fed616c4081e2d20e46e22c35d7a7bd781abdc3767ae

  • SHA512

    18b4a9ad6efe93f18a8c534b5c31b46b6120bc303541fec2d85debff1c427f2b16e6d06867abe0f707264efe0181fb3c35334d3471e55feeb10315ef83bdaa32

  • SSDEEP

    1536:Zk05MDn5NRgyRhOzDhwsNMDpXExI3pmom:ZMDnBxfOzDhwsNMDpXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

147.185.221.21:30335

Mutex

573e35ed57e3dfa36627f43e22992835

Attributes
  • reg_key

    573e35ed57e3dfa36627f43e22992835

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections