General

  • Target

    33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35

  • Size

    55KB

  • MD5

    f4eb15e168ffc73689af1b666a588b96

  • SHA1

    265717f4934cac2de12f9e7fe0ee8724c587dbb7

  • SHA256

    33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35

  • SHA512

    09f0e489726ba9aa4776063746848b80560efe7390dcea875af8923e648bc7d645e5c6b7d61b0be2ca7d46295372e51426164c1a7cf55a6a3b113a5f7033fc45

  • SSDEEP

    768:AmOsVSt1ManUk2N/PSJ2hrcr3UwhkSN3mwFvfu0YMDHPsXL7XJSxI3pmUm:Am/gDnqN/PSAqzDWwsNMDaXExI3pmUm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

41ebzgw.localto.net:6545

Mutex

2c0e0c6d000bac871a2b654eeca306af

Attributes
  • reg_key

    2c0e0c6d000bac871a2b654eeca306af

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections