General

  • Target

    e626dd6a23a90e2a7e6792020ee3fa20N

  • Size

    23KB

  • MD5

    e626dd6a23a90e2a7e6792020ee3fa20

  • SHA1

    afe7bf6067c87013669fd905169be6fcf2ac0c12

  • SHA256

    e6bfd08fca7a0f8ffcff6dcc4600a4b923cedd98de83af599670bfaeeba13c92

  • SHA512

    638bace0d38ff6e50a2f4e1b234984a6423e1c8dc867e23b996f0bfa2781cb926e671fa9ba65a6183f746f06663374b26098acbd5cf096f2280872b36af6d999

  • SSDEEP

    384:bluBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZ0ZH:kOmhtIURpcnuZ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

server10-52663.portmap.host:52663

Mutex

96e1a4795100058feca2324d7a804145

Attributes
  • reg_key

    96e1a4795100058feca2324d7a804145

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e626dd6a23a90e2a7e6792020ee3fa20N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections