General

  • Target

    503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89N

  • Size

    37KB

  • MD5

    c2d69bc64ca834ade114523d31af0b20

  • SHA1

    7579b9a2e45e5b0f99113b118981064007874e5b

  • SHA256

    503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89

  • SHA512

    39b31ffe0d68ea682908ed74dcd8ee699219d174aafec10fc086a01bdf6f9c09e7a43044d5a711504d28f289ac0344b0b4c1a6a47a3e0fb988d01cabb4e1acc3

  • SSDEEP

    384:gQmn6ikNRxdDsyNyyszdSZPhs8mGz0rAF+rMRTyN/0L+EcoinblneHQM3epzXIEV:nm0eyNBszdSZC1GwrM+rMRa8Nu+Eft

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

flowers-novelty.gl.at.ply.gg:50375

Mutex

5658a3c4e97b27740dd9826a509bb4c2

Attributes
  • reg_key

    5658a3c4e97b27740dd9826a509bb4c2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections