General

  • Target

    c8d3c048a92b468514343ac258e5c8047ea66ef3b54e4f4200f7243de06ae31fN

  • Size

    37KB

  • MD5

    0e78a49bf12394a06cf511f72d76c040

  • SHA1

    6bac7cc2f03a22654151501a02570b41a9db4365

  • SHA256

    c8d3c048a92b468514343ac258e5c8047ea66ef3b54e4f4200f7243de06ae31f

  • SHA512

    f5a5797326eae328f3876889c1e4f07d7fb853df6dd1a06545696c2fcc59ae1a9fc1b28f1c4a3b1f592016c31ac20c0704531d8d68b8208040f2b1aef1c0e962

  • SSDEEP

    384:ckaIiudjtD+P3V+y0b3+LCtf1QseiXFrAF+rMRTyN/0L+EcoinblneHQM3epzXV2:fFmV10b3+LCtCViVrM+rMRa8Nuzyt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Man

C2

0.tcp.eu.ngrok.io:11347

Mutex

658861a468f9c892637f296b375f895a

Attributes
  • reg_key

    658861a468f9c892637f296b375f895a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c8d3c048a92b468514343ac258e5c8047ea66ef3b54e4f4200f7243de06ae31fN
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections