General

  • Target

    bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063N

  • Size

    23KB

  • MD5

    b71d1c2b3678ffbf530d0253379febc0

  • SHA1

    71fb2a454ffc903f2a5de5c68d71852d9b7b361b

  • SHA256

    bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063

  • SHA512

    e7c54e2777a40ad3053f896e3de592b168f2750811276bacd2b2b23f77887f643881b48ae52076bdef33d762348be1627b60c9b3c89f97e6438d23eb525b942c

  • SSDEEP

    384:awTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZxV/j:5vZiBK1edJRpcnuYl

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

motisyoink.ddns.net:3332

Mutex

b7eb86012438665b417c92deefecaa88

Attributes
  • reg_key

    b7eb86012438665b417c92deefecaa88

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections