General
-
Target
Server.exe
-
Size
43KB
-
Sample
241222-fts5dsvpcq
-
MD5
d9dcbd5ca89e7a8e76691c7dca8046c3
-
SHA1
51036c72c965a41c994bcc6d24d943eebf471c35
-
SHA256
177954bd295446d67974df22cae9c9d106cce8af9286ef287f1faaf51c1a8255
-
SHA512
d6ed3f468d1969521b78dd0781730ee77dbf473e5423905e76a0314bd2744e1fcb08ad931b7dc5a89b6def3bd90356400b00c4f73bdeb8a349817094a40d8d69
-
SSDEEP
384:IZyZcg98NaIyrtdd32E68ETiE7QzsIij+ZsNO3PlpJKkkjh/TzF7pWnXmgreT0pO:+4ywFrLd32HfquXQ/ouC+L
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
6.tcp.eu.ngrok.io:11237
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
Server.exe
-
Size
43KB
-
MD5
d9dcbd5ca89e7a8e76691c7dca8046c3
-
SHA1
51036c72c965a41c994bcc6d24d943eebf471c35
-
SHA256
177954bd295446d67974df22cae9c9d106cce8af9286ef287f1faaf51c1a8255
-
SHA512
d6ed3f468d1969521b78dd0781730ee77dbf473e5423905e76a0314bd2744e1fcb08ad931b7dc5a89b6def3bd90356400b00c4f73bdeb8a349817094a40d8d69
-
SSDEEP
384:IZyZcg98NaIyrtdd32E68ETiE7QzsIij+ZsNO3PlpJKkkjh/TzF7pWnXmgreT0pO:+4ywFrLd32HfquXQ/ouC+L
-
Njrat family
-
Legitimate hosting services abused for malware hosting/C2
-