General

  • Target

    LaucherSynapseV4.7z

  • Size

    14KB

  • MD5

    5d9d29404d520bb127f9ac15686b38f0

  • SHA1

    baf277de9451b5ab458070c53775f610efb03967

  • SHA256

    68635669a3be3a643e7e084c39a425006c5c0016c8ae798eecd346e81feb7980

  • SHA512

    d9165c15bf8cd32c36854b951b2426de63f0e8aae666794987255485bc24fc8b7d5ad664ed985bacb0ca212af5ad768ea7bd3164a923d6117a2f91faadb4654e

  • SSDEEP

    384:TJgp8hp1320F4M9HhO3hv+mXrWbMQhpa0psFIsgDF90o:9gKp1320FEAEKbfOMsrgDgo

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:19688:9999

Mutex

4b6ded2c8a70c1b087e0b5124eef254e

Attributes
  • reg_key

    4b6ded2c8a70c1b087e0b5124eef254e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • LaucherSynapseV4.7z
    .7z
  • LaucherSynapseV4.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections