General

  • Target

    7c99d4dd852cb64361568024969ddc188672ec6ad3cf998ded8332e670a73edcN

  • Size

    37KB

  • MD5

    729791dc375db3eac600887441235070

  • SHA1

    0f0230cb294a5fbd7be193790107a46efe6f47ab

  • SHA256

    7c99d4dd852cb64361568024969ddc188672ec6ad3cf998ded8332e670a73edc

  • SHA512

    8e2030507f85559db3df5668d7a57f72c43509e602503510dd64108c9db8407b07635bd502582cac55b5a462f8f7126cbafc0b5043108af246e35e4da386a35a

  • SSDEEP

    384:CmOsrUiS6L1G5k2gyk/8If5e/QUZSiKrAF+rMRTyN/0L+EcoinblneHQM3epzXIZ:Msz32bk/8IQYUZStrM+rMRa8NuKLt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

farter

C2

0.tcp.eu.ngrok.io:10472

Mutex

6b90c9f607e615fb2ec10658187bc2eb

Attributes
  • reg_key

    6b90c9f607e615fb2ec10658187bc2eb

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7c99d4dd852cb64361568024969ddc188672ec6ad3cf998ded8332e670a73edcN
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections