General

  • Target

    d5e2d41c6766c1fcbd50768faf3b116efccb3bbcafda82fc8334f3a6265b4554N

  • Size

    27KB

  • MD5

    dda8cf51441430d09a05f60039ad46b0

  • SHA1

    7ece230455c7d2ed695a5037a76ceb1f03a928f7

  • SHA256

    d5e2d41c6766c1fcbd50768faf3b116efccb3bbcafda82fc8334f3a6265b4554

  • SHA512

    3005e93e7793103100969fc3ca47b5af49223cc53687e972257d6acec0b6f01103ca330ecf3d8054628bcfbbb96338518ecf48213b5a8b26bba269d8e7fa2983

  • SSDEEP

    384:SLG9fLKCJ1G4APoWahxolxQmCYPPdR9MZAQk93vmhm7UMKmIEecKdbXTzm9bVhcj:MXUEIwxWZA/vMHTi9bD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

broolan31.zapto.org:5439

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d5e2d41c6766c1fcbd50768faf3b116efccb3bbcafda82fc8334f3a6265b4554N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections