General

  • Target

    6d7c175ff558a6a0e343aa0e662d7c778e47b1a0656a780905f63e445def0685

  • Size

    93KB

  • MD5

    bb68f0c3619e9a111808d779c0af89ac

  • SHA1

    74c76fb290650c808ee31b02f43f4ebcaa834a96

  • SHA256

    6d7c175ff558a6a0e343aa0e662d7c778e47b1a0656a780905f63e445def0685

  • SHA512

    82f25996185eac9ad05f7646c612e25643d79ac0f83750f6d593d7f37b28f0dfa934b816d07d1d734a81e4b546ddaf877e5de928df3d3e72c858dfa7d3a6ac2e

  • SSDEEP

    1536:u5k1GkeUqZJO5iNSimjEwzGi1dDDDYgS:u5PUqZJOQAOi1dTB

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

ny-northwest.gl.at.ply.gg :53886

Mutex

51299ad88208cb0142bb2a1505008270

Attributes
  • reg_key

    51299ad88208cb0142bb2a1505008270

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6d7c175ff558a6a0e343aa0e662d7c778e47b1a0656a780905f63e445def0685
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections