General

  • Target

    d.exe

  • Size

    55KB

  • MD5

    54f0aa470da2f129138bbced85bb8d75

  • SHA1

    d6496182d5087d5371daf67c56b044ab23aee10c

  • SHA256

    d00f28b765821f7a58a3ae569c2458d58e94b09bb5ccdaa7d3247b82b338dac2

  • SHA512

    8d3615921872a8c8b93fe42e5eb29085498e69de2231a2bf29970c573d29a80cc8aff2bb80e8f070de29e55121d0207cdc18235bcbfc007d0dee88eb9b7bff11

  • SSDEEP

    1536:lL+YADn2N29XnfuCCtDCwsNMD7XExI3pmfm:QYADnX9XnmrtDCwsNMD7XExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

fucked by kev

C2

activities-consist.gl.at.ply.gg:7878

Mutex

c08d762111c4d0de5d1ea0b19f45ff7e

Attributes
  • reg_key

    c08d762111c4d0de5d1ea0b19f45ff7e

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections