General

  • Target

    df85cb72fd11898d37dd54c62741b3d8cf14aeb9ef7c96410e43689d5c8f1748N.exe

  • Size

    23KB

  • MD5

    8717a7befebd1c864813d76df2bbed80

  • SHA1

    e076af9250dfc42b8b9d5db8025ff3c2e9d5b553

  • SHA256

    df85cb72fd11898d37dd54c62741b3d8cf14aeb9ef7c96410e43689d5c8f1748

  • SHA512

    d5fbdc90747f650dc2a0232af7e0b0277b0985214659ead5130558628856a1b5774872621a5f8b3ece40b511d7bcba381cfb18ff3111d9f916c221578ee87ed6

  • SSDEEP

    384:kT2x0W3qZN2ATtRGCfCo9D46BgnqUhL19mRvR6JZlbw8hqIusZzZ9UZ:vh+rdflRpcnu5

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HaCkEd bY LoKn

C2

customers-edmonton.gl.at.ply.gg:28608

Mutex

5a0e6576524fad771bccf79eb40f7eca

Attributes
  • reg_key

    5a0e6576524fad771bccf79eb40f7eca

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • df85cb72fd11898d37dd54c62741b3d8cf14aeb9ef7c96410e43689d5c8f1748N.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections