General

  • Target

    06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8

  • Size

    23KB

  • MD5

    dbd6e806a9569164117e585f0af40eef

  • SHA1

    3ba711b2eb5777970c393c5ccb1af6ff8736ffaf

  • SHA256

    06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8

  • SHA512

    d3ec6e916642cd3996a1e54ba1758a932400184569c8007e4d71732e3b3a39a1b125acfc24af56f3a155840d535e4b8539d8eef7e2480a4274e1900a06642a02

  • SSDEEP

    384:PTMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZad9:PMb9glF51LRpcnu19

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

djwolfdz2.ddns.net:3389

Mutex

9d770d5d68d419ae777037dcfd1a78d4

Attributes
  • reg_key

    9d770d5d68d419ae777037dcfd1a78d4

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections