General

  • Target

    bc3e318799303a80de34d04f7f6aa10789b1f255e79f3e943689048eae0e094c

  • Size

    37KB

  • MD5

    d7714e5befa0a3f442d68db99b0ac6e6

  • SHA1

    b0428534d0cfd7b5994f74ddb5f124db5a7199d9

  • SHA256

    bc3e318799303a80de34d04f7f6aa10789b1f255e79f3e943689048eae0e094c

  • SHA512

    ef306b148a2fef87b36c4fdca6f97bf5e895c3595269b2a71dfb23f89c6dc1dcba0c628693341cdda2f87e2c8748a67c9d211e9b4f1757ce9ee0828b1a042e57

  • SSDEEP

    768:l/Yl2KhfIwdpszX1zaVufrM+rMRa8NuSCtt:l8Iwd+TtaAg+gRJN4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

win.32

C2

levels-plane.gl.at.ply.gg:53273

Mutex

65afbe4dfb648678c573ea3e7097c737

Attributes
  • reg_key

    65afbe4dfb648678c573ea3e7097c737

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bc3e318799303a80de34d04f7f6aa10789b1f255e79f3e943689048eae0e094c
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections