General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    02210e013d0b6d534781137224af1e60

  • SHA1

    fe0e9c461fc8a1d7399348f28f40c8910b203300

  • SHA256

    7a6edc6b74d76e1408b04cb2ed4a68cdd1d453c8ffeba1c9738104b9ce396ebe

  • SHA512

    8709143e7084c00dbaadcdeb4606cefb2b52076126e08731c032675ca4f87d8be3cc2fbbd5967d4331971d71ad80cc185faf5e018b36562afb374575d1dfe551

  • SSDEEP

    1536:pwws4DnAN7jytFADKwsNMDUXExI3pmfm:mT4DnA2PADKwsNMDUXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

2.tcp.eu.ngrok.io:18768

Mutex

a5b0f3cbb775d9991f0afd56ded86e2d

Attributes
  • reg_key

    a5b0f3cbb775d9991f0afd56ded86e2d

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections