General

  • Target

    41a45e389e0f1cdeba2beb6e19d8c00f5e7a5808866f176a638ce4884e478999

  • Size

    23KB

  • MD5

    06bad8a58f0b8f50276122a508292ccd

  • SHA1

    95106b62f210a0e778602685d17f2a89c0b9accb

  • SHA256

    41a45e389e0f1cdeba2beb6e19d8c00f5e7a5808866f176a638ce4884e478999

  • SHA512

    9082ac5943dc9d4fb9a4ff7f8237b9bf857a8f83fb179a47803d25fb9b7634f31992051031ed4e731de09858822d0fb7a560d70c4ce26a7d634d03339289447a

  • SSDEEP

    384:kT2x0W3qZN2ATtRGCfCo9D46BgnqUhL19mRvR6JZlbw8hqIusZzZ9UZ:vh+rdflRpcnu5

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HaCkEd bY LoKn

C2

customers-edmonton.gl.at.ply.gg:28608

Mutex

5a0e6576524fad771bccf79eb40f7eca

Attributes
  • reg_key

    5a0e6576524fad771bccf79eb40f7eca

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 41a45e389e0f1cdeba2beb6e19d8c00f5e7a5808866f176a638ce4884e478999
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections