General

  • Target

    d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0N

  • Size

    23KB

  • MD5

    73553f0520d2bbb090228f78a93cd670

  • SHA1

    0529a9d3fbac2784ba161827d14c31eae8f2f1ba

  • SHA256

    d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0

  • SHA512

    fab4f004efebe2eccc375269a82d6a94e6dc4be00c6b4c5d27a9b012fd64f39c1017932868951012818f2342873798245d163c9bd0fb1021bab578ccc9223184

  • SSDEEP

    384:3W3qbCKml4hoo9IMVCGpOsjhEv6/ghrrgOpt3xmRvR6JZlbw8hqIusZzZyK:3SN0aatpAnARpcnuC

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

https://7841104bb6360028d935dfc9e856a4db.serveo.net:7777

Mutex

1e3469295dc52f6e1f2bb96a187dfd66

Attributes
  • reg_key

    1e3469295dc52f6e1f2bb96a187dfd66

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections