General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    832ef656019128a1efc9adccffa2eb4a

  • SHA1

    ac17121592150a93c0495fc080c4f249130497e0

  • SHA256

    50dc05f3579090555c00dc10578afbba9e4c5317c088b3dcaa908fddcddbbf81

  • SHA512

    03edd2b8dfd5d14b99a65450d477f00b7828a98e81f3e140f8656cfbeccb1feee416237348c240d3d84b4231e76f72f065f829ca4eb6a0f198900881820bc435

  • SSDEEP

    1536:NF/dIDnrNZtLy9CIDKwsNMDKXExI3pmdm:H1IDnRekIDKwsNMDKXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

le-pencil.gl.at.ply.gg:6703

Mutex

2396311c05a02e304f94bf71cd08ce42

Attributes
  • reg_key

    2396311c05a02e304f94bf71cd08ce42

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections