General

  • Target

    57bf3ab110dc44c56ed5a53b02b8c9ccc24054cf9c9a5aacc72f71a992138a3f

  • Size

    93KB

  • MD5

    71b3810a22e1b51e8b88cd63b5e23ba0

  • SHA1

    7ac4ab80301dcabcc97ec68093ed775d148946de

  • SHA256

    57bf3ab110dc44c56ed5a53b02b8c9ccc24054cf9c9a5aacc72f71a992138a3f

  • SHA512

    85ddc05305902ed668981b2c33bab16f8e5a5d9db9ff1cee4d4a06c917075e7d59776bebfb3a3128ec4432db63f07c593af6f4907a5b75c9027f1bc9538612e8

  • SSDEEP

    1536:PUNJD/HBZbszKu9AZpE7r1jEwzGi1dDWDtgS:PUUzK4AZCHCi1dA6

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

exchange-reasonably.gl.at.ply.gg:30620

Mutex

f41ac0c2ea25f3f8b0a75a7371d6b015

Attributes
  • reg_key

    f41ac0c2ea25f3f8b0a75a7371d6b015

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 57bf3ab110dc44c56ed5a53b02b8c9ccc24054cf9c9a5aacc72f71a992138a3f
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections