General

  • Target

    9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a

  • Size

    93KB

  • MD5

    49130501c3e3ced98b19c89406ea8afa

  • SHA1

    57fd8ae8455d6d6af27ee88a51e32ace8d7ef588

  • SHA256

    9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a

  • SHA512

    ead3d077eb9f79a32de75531570bbce895852058c20c0deb440e3c832e3407249088e6218094b9789ee69ca707482e5be729ccdc00c2d3f8e709324adfa5080b

  • SSDEEP

    768:IY3/upD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3jsGa:PuLOx6baIa9RIj00ljEwzGi1dDvDEgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

36dd2bffd730e382987c13909f3cc4a3

Attributes
  • reg_key

    36dd2bffd730e382987c13909f3cc4a3

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections