General

  • Target

    99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3

  • Size

    37KB

  • MD5

    67931560029cc67967f024e3c42c107a

  • SHA1

    fed599a8ee2a821e9f93109d1e660118ff3f0451

  • SHA256

    99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3

  • SHA512

    85a9a9735e3ba7693ee3d01b808929e48e0ca7d03762ef54a1024ae89238d992310a575fd5c429c62cb2030732dd25033c1ce71e0320c196fd755d62f1c47a96

  • SSDEEP

    384:GaiKMizdnjnBhFbJ8ycPzNX9Bwy25FrAF+rMRTyN/0L+EcoinblneHQM3epzXiNR:zignlLJfcPzNXt2zrM+rMRa8NuIVt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

45.83.207.236:5552

Mutex

c932779fadb451b44351b10e6e56bf73

Attributes
  • reg_key

    c932779fadb451b44351b10e6e56bf73

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections