General

  • Target

    4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3.exe

  • Size

    37KB

  • MD5

    4a1a0fa8fed53f3be3b26d4e2f38444b

  • SHA1

    f23d93559345eed220ad8292d43e48d35c203d52

  • SHA256

    4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3

  • SHA512

    e7b7ef9a30424fa3545174e44aeea33e01c583400bb2a6a0eafe38adb9c33e1506ca5d5d2ea22b72796f858545a7702bd5f4f093f13654473ff14457b616d257

  • SSDEEP

    384:mwbsiDlT95hL5YyUvjh/xOi4aaF3ArAF+rMRTyN/0L+EcoinblneHQM3epzXUNr4:F5v5zUvjhDlaRArM+rMRa8NuK2t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

yano.ddns.net:1605

Mutex

e43cca706d59e01c80fe2fae1742de3f

Attributes
  • reg_key

    e43cca706d59e01c80fe2fae1742de3f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections