General

  • Target

    354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N

  • Size

    37KB

  • MD5

    8a59c16c10ffa6c22770bdf07d3fb4c0

  • SHA1

    c21e6bedd447ac4855006f35df5aef68ffa75b38

  • SHA256

    354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991

  • SHA512

    9cdd20635826225b7bda3fae88d822d7eb9cf442caa6c8a3c164865208aca1cb73c17acb0c1a74f43f049d92c3c956b11013e8b27c4f724bcc750a6ec1dd6c15

  • SSDEEP

    384:/gtvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXF:Yt7TZ38fvCv3E1c1rM+rMRa8NunRt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:11961

Mutex

03b4c5d6915391a54e8f12c89b78174f

Attributes
  • reg_key

    03b4c5d6915391a54e8f12c89b78174f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections