General

  • Target

    af9b13f209cb3854e56e139f4059ae664702e7d4d9ef61908d42492c1ecfdf00

  • Size

    23KB

  • MD5

    c522ce8ab4ac33f7097a2a6a92988661

  • SHA1

    d4107ab866a91c2b376bd55e727ea80f0aad98e3

  • SHA256

    af9b13f209cb3854e56e139f4059ae664702e7d4d9ef61908d42492c1ecfdf00

  • SHA512

    f93c2d16d459dfb6886888753a54dd4bca6e99cb7e8797bd861d51e189f1e84e1b6f3d99fa7b632409da2714d35a76055d0fac9c4b6a828cf7d545f900baa3f2

  • SSDEEP

    384:XslUlEvOEJ8xWwYJOMiOBZEdJ156tgtwi5HhbQmRvR6JZlbw8hqIusZzZMfe:IeEvwIlLMRpcnua

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.3:7000

Mutex

e13be9b20df56ddd0e76f11d87ee6557

Attributes
  • reg_key

    e13be9b20df56ddd0e76f11d87ee6557

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • af9b13f209cb3854e56e139f4059ae664702e7d4d9ef61908d42492c1ecfdf00
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections