General

  • Target

    njrat playt.exe

  • Size

    65KB

  • MD5

    adcf3bdda61e9e58f1561b40de92e648

  • SHA1

    40e0a631bb9e110eb19487dec6a11e21099bfb22

  • SHA256

    d38c0fe3eef5b9eba6f287b0f6cb92a8d6decb084e7f143d558f887454878505

  • SHA512

    025e449494aa563eaec31e1c79c3be830a71ebdd605294ce0eedcee5731fa66c9bceb2269918e64f14795e2b77746883655e7918722b2158b85e9b2a79d083cc

  • SSDEEP

    1536:p2qsgs4oN36tZQviFw1ToeJBnvbqfLteF3nLrB9z3ndaF9bPS9vM:p2qsgToN36tZQviFCkWBnefWl9zNaF9P

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

Lox_

C2

127.0.0.1:7777

Mutex

MsBusDriverUpdaterAuto.exe

Attributes
  • reg_key

    MsBusDriverUpdaterAuto.exe

  • splitter

    |Ghost|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • njrat playt.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections