General

  • Target

    de35a1f43c766fb0011acd7aa43b967405db697c4bda37ebf8a08430bebd8670N

  • Size

    23KB

  • MD5

    0f47552e74da6833f92ccb6494a11000

  • SHA1

    78318c7529456bc962636e45baaf0ecb27b58864

  • SHA256

    de35a1f43c766fb0011acd7aa43b967405db697c4bda37ebf8a08430bebd8670

  • SHA512

    ed1dc550148ef83472cf00a6c23fe66f7b6a98ed6a25b61776d21a76b57842d29e80aa82d67f6c901d7c51dc273a3d5c0cbaf3fd7e951dd58d8776597dccba40

  • SSDEEP

    384:fcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZR2I:E30py6vhxaRpcnuaD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

IP

C2

diffdns.duckdns.org:11767

Mutex

3287d0b6dfdc541df88eb2a16d9884c6

Attributes
  • reg_key

    3287d0b6dfdc541df88eb2a16d9884c6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • de35a1f43c766fb0011acd7aa43b967405db697c4bda37ebf8a08430bebd8670N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections