General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    3eec7c5dba3256f8a1d800c195912705

  • SHA1

    1f665891ee382308b232c309059cfba837056f06

  • SHA256

    69b77de8f22e8096ac09e41ccf4833d701228d038d0cf849beaa5bd330d4c658

  • SHA512

    f6d2122eca3838a29a3b9784781d80415504025be7482b08717bee5b7a76efac93b494797b22a0470dcf08bd67b558fffd097a91284200132d0a4347d253d4b7

  • SSDEEP

    1536:++oADn8fLNG/SbrKDD3wsNMDTXExI3pmam:yADncsqbeDD3wsNMDTXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

veletroblox

C2

txx8luo.localto.net:6272

Mutex

b92c208d65b2ca038d9ed4c69e421e7d

Attributes
  • reg_key

    b92c208d65b2ca038d9ed4c69e421e7d

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections