General

  • Target

    cbb306c3580deb5f653267ed450ccd9e45a6561dfe43ad5b4b3fae58c2dc2a78

  • Size

    93KB

  • MD5

    ea522e58e566f3d8adab8e3e7a35537c

  • SHA1

    bf900e281fab79258d861795e87cf27e19678238

  • SHA256

    cbb306c3580deb5f653267ed450ccd9e45a6561dfe43ad5b4b3fae58c2dc2a78

  • SHA512

    0f62a26e62bf65797650da2e63b67ec4b1def457141cb51cb14c306c8f7abe2d37e349c8f2268ffcd2c4283c07eea0cff2499c58f5d903becfde35844336e793

  • SSDEEP

    1536:Gxk1GkeUqZJO5iNSimjEwzGi1dDODVgS:GxPUqZJOQAOi1dIi

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

1

C2

hakim32.ddns.net:2000

time-rebates.gl.at.ply.gg:38610

Mutex

d7962ac2dc7da4b85a6dc64db2eeab89

Attributes
  • reg_key

    d7962ac2dc7da4b85a6dc64db2eeab89

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cbb306c3580deb5f653267ed450ccd9e45a6561dfe43ad5b4b3fae58c2dc2a78
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections