General

  • Target

    Payload.exe

  • Size

    27KB

  • MD5

    6363fdf6807cbef35f331eee2acd8c95

  • SHA1

    a3c39ca66596d25bb6b49c691348b29f6c7cf582

  • SHA256

    091389e24f8de1ef56cda84cc7f8598767bedf9c4b1dfb73736713b887c259c9

  • SHA512

    b1a56829768578ec64e0ddaa7bd7023075ec8559c1fee57d3103222e0aea42137fce5f8ac4396701c33349af3db39e2d61d8baf00d3baf932681e085e5231f41

  • SSDEEP

    384:gLZeZoTmgEJLbwvqWDbPxZh7M9AQk93vmhm7UMKmIEecKdbXTzm9bVhca16fr6eR:+ENvwy9A/vMHTi9bD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections