General

  • Target

    enai2.exe

  • Size

    31KB

  • MD5

    a2d2fc6108063a466264a34e7c46c8a3

  • SHA1

    ddab38e1dcf749d355bf63a0eb25ce844db1d880

  • SHA256

    7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a

  • SHA512

    2d34d5c75f2cdad94fa957c80d71f697b2fb9bd949e25d9035234c9c7a37f00fd8d92b3e7c17c84a2a65b9b4893f1336850722e4111244f2d70e0cc1eaa44145

  • SSDEEP

    768:gjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0tiX7j:3kKdisvQVk+j

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Enai

C2

6.tcp.eu.ngrok.io:14377

Mutex

bd898fbb4a2356e019689e2e64340d76

Attributes
  • reg_key

    bd898fbb4a2356e019689e2e64340d76

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • enai2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections