General

  • Target

    356efbd5427f7b4079a0efaec5b72ce36fea23fdaa22331ae35c7e15323df2ae

  • Size

    23KB

  • MD5

    a590cf933af43e45adc2bc0490366cb5

  • SHA1

    3d11acef56ca27cfe356ac55444a6197ea064cfa

  • SHA256

    356efbd5427f7b4079a0efaec5b72ce36fea23fdaa22331ae35c7e15323df2ae

  • SHA512

    453774c11a029731bfd749406d076c7987c4a57603e890fd12c8585e59b33ea7b79ab79c330a4a33d4b17ce693a3f74e31a464055268d9ba0b0a76e7bc3efa82

  • SSDEEP

    384:WzmicUDPiJUQrlRGSHCYlbY6ZgvSMBTtxmRvR6JZlbw8hqIusZzZ68:CpD2btHxRpcnuQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

By: "CranKy-Hk" 7awlii

C2

chrom384.servegame.com:1177

Mutex

29cb34d147658b14ff9d42936a5ab9ee

Attributes
  • reg_key

    29cb34d147658b14ff9d42936a5ab9ee

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 356efbd5427f7b4079a0efaec5b72ce36fea23fdaa22331ae35c7e15323df2ae
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections