General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    6607fcf7763d63e262dc84410bbeb729

  • SHA1

    258cd5c203d90cca1362b417c0a6fdfed2a83ca7

  • SHA256

    2059f6871d29e0ea9bec89a4af8a117551ea3a3cd844691557bd8804e3af5e2a

  • SHA512

    b2dac9364f0cb5183e4259b95d95ffb79fea908606d968f0baeb6be5996c00bccbead2608621edd5601038ce469faa6a2148d603d7f28f68ae7105a5bbe06a43

  • SSDEEP

    1536:EmsoDnb4DNQ7SCCHDrwsNMD+XExI3pmAm:YoDnEWOrHDrwsNMD+XExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

cnet-contracting.gl.at.ply.gg:10206

Mutex

578c40e26a890cb6801040b7382c8b97

Attributes
  • reg_key

    578c40e26a890cb6801040b7382c8b97

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections