General

  • Target

    5d50ea64bd0717e771177fbe97847d0c12fdb9f41b0bd831225bc2a3638c10f6N

  • Size

    37KB

  • MD5

    7b65a73df8efee5e01947f33f3623110

  • SHA1

    6c11d51568b71a54d90f6dd1569dd36503034c78

  • SHA256

    5d50ea64bd0717e771177fbe97847d0c12fdb9f41b0bd831225bc2a3638c10f6

  • SHA512

    383ba74720fb45686e9a370a6514963f22dd6e6d76ebc99023e0a8d098427ed91a91154d270b876d0a37a3e0619cca2b93449dd295f8d7f24824d9599dd90fe5

  • SSDEEP

    384:VxCNb7LsikZ9zNf/1uyU71evdjsOaPJrAF+rMRTyN/0L+EcoinblneHQM3epzXHd:+Nf4l1lU71e9FaxrM+rMRa8NuZXt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

basis-cheap.gl.at.ply.gg:42449

Mutex

dca05bb9d402767cdb92878f21bc3baf

Attributes
  • reg_key

    dca05bb9d402767cdb92878f21bc3baf

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5d50ea64bd0717e771177fbe97847d0c12fdb9f41b0bd831225bc2a3638c10f6N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections