General

  • Target

    76b440ea7294ff4056b645a310fad44617a57bde7e48c8a6020e35d42b7226e9

  • Size

    23KB

  • MD5

    963b18ab9cb41881669e882fdb789fd3

  • SHA1

    df7bbefbcac84bcbaac060dc5302f50fda7d8c5e

  • SHA256

    76b440ea7294ff4056b645a310fad44617a57bde7e48c8a6020e35d42b7226e9

  • SHA512

    9a5c2e9b0a14eb937b04c659e26cd274051fdb6d23a9c50e5d48926289e9bcd1c7ef34952728c73fb592e490b3c10436ef47ba30a81b68db86e07a8ff59b9b3a

  • SSDEEP

    384:5MK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZdp:Kb9glF51LRpcnus

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

DirectX 11

C2

0.tcp.ngrok.io:5000

Mutex

4c75e0f17bf02f3427deccb7aef9f94e

Attributes
  • reg_key

    4c75e0f17bf02f3427deccb7aef9f94e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 76b440ea7294ff4056b645a310fad44617a57bde7e48c8a6020e35d42b7226e9
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections