General

  • Target

    9e0402dd74192fd4235d896ee59d54af833699fee031f71793242dd910262404

  • Size

    93KB

  • MD5

    ec78d87dc78d9b162d9039cbe95f1e4c

  • SHA1

    246b98c62eeb61972320984be380e95a20481d37

  • SHA256

    9e0402dd74192fd4235d896ee59d54af833699fee031f71793242dd910262404

  • SHA512

    3e682d04b10d8d3b4450db4e349a70391bfc091f889a4ca52d0f8f8b99fbfebb8acd1751683de299c4cb5c4dc199121b4b453f24dec6d8d3fc7313cf41089b23

  • SSDEEP

    768:tY3jxfhWXxyFcxovUKUJuROprXtWNzeYhYbmXxrjEtCdnl2pi1Rz4Rk3vsGdp4gM:sx5WhIUKcuOJ2PhBjEwzGi1dD7D4gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sSsSsSs

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

760a119954d625f2e21f4c5db4622283

Attributes
  • reg_key

    760a119954d625f2e21f4c5db4622283

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9e0402dd74192fd4235d896ee59d54af833699fee031f71793242dd910262404
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections