General

  • Target

    64c3780f94f551fb13719a96e4bdf1039e3e9b08a3a4991023ef4a866c27264a

  • Size

    3.0MB

  • MD5

    6153b1b3a8b185536ec6042605636d92

  • SHA1

    4a48d5d2df86c475f4f6dfb86dd53c7df934a0e7

  • SHA256

    64c3780f94f551fb13719a96e4bdf1039e3e9b08a3a4991023ef4a866c27264a

  • SHA512

    8a3ffb1bc2b9d7e89023c78c8cbbdcaec2b7de99661d44b58f02714923144198ecfcba43162057a97c304b741ee9b1ac398cb0a8805fc5e250e41779f40caeb0

  • SSDEEP

    49152:fHDTjTcecrnHYC91q4HW7WIymT9kxlT30Wi1lrTWdYQG+3ISKCHZn98CoLPM+:PfcLHYnWITT9kxlT30WIeT3I+naLPM+

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sync

C2

hakim32.ddns.net:2000

bolbol555.zapto.org:1177

Mutex

7983a6da633302758f1026d4ede1b311

Attributes
  • reg_key

    7983a6da633302758f1026d4ede1b311

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 64c3780f94f551fb13719a96e4bdf1039e3e9b08a3a4991023ef4a866c27264a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections