General

  • Target

    9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849fN

  • Size

    93KB

  • MD5

    302cf7032efe524349fa1850ce0661c0

  • SHA1

    9c2ea1f3d82970b7168432536c983fc6dd990b88

  • SHA256

    9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849f

  • SHA512

    bd5c444b332d122aba426b0a96c5d479387b47a676402bc714e2b8ee37495d7be7aec2873c1227c4764fc3d8278d68a8a3461b0bc44ba23b75ca7b68e0ed98af

  • SSDEEP

    768:LY3mUByZnDQMMpAZrGSt6udttXymsahkGJiXxrjEtCdnl2pi1Rz4Rk3lsGdp5gS7:LUUZD3rGWNd7DhkhjEwzGi1dDVD5gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

0.tcp.eu.ngrok.io:12507

Mutex

fde06e51ba752addef229f6178664e93

Attributes
  • reg_key

    fde06e51ba752addef229f6178664e93

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849fN
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections