General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    9543a1b2a52c40fa3a2fc33f9b7251de

  • SHA1

    6fde8e48fb74f1860f470f6e0ed1297c5181618e

  • SHA256

    899fe26243b6efab008d442b471a000977f75113589d11cd33c793573c76cf79

  • SHA512

    3f6a08ac664288e192df7deac35a9e27df2e7f96217f53384cc9f1c60af818e478dfe4ef12ea7bee0689bb66f9f74a2dc3989c0365b87fc92eb2046425a05a56

  • SSDEEP

    1536:gjYADn8fLN2/SbxRDD3wsNMD7XExI3pmEm:lADnccqbTDD3wsNMD7XExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

cities-constraints.gl.at.ply.gg:16265

Mutex

02c50d9a6cd2748a3e6820b9ed4d22d1

Attributes
  • reg_key

    02c50d9a6cd2748a3e6820b9ed4d22d1

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections