General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    b6ccfd0a35caa6167c261e548c19108b

  • SHA1

    e594da96bfc5c60324eaac21198d820fdc7f547b

  • SHA256

    ec52b8ac65ba4eb74edac6e6887c800aa61f6512e0285203c41cad16f789a3fb

  • SHA512

    318747d13eef0ffbcc29a09e3666a7671318186f7f1da45d46c950fabca35d4eee77c705e2ac397eae4edab101e862fb23182c50d2b74f49369833fda988d2c8

  • SSDEEP

    1536:lWDM8Dn+QNoB4vZ9Vk7dwmuXKDCwsNMD+XExI3pm7m:wI8Dn+nWTVk7umuXKDCwsNMD+XExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

F9t family

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

0ecb0ae2cd4872c3a8e9ee19da99e4b8

Attributes
  • reg_key

    0ecb0ae2cd4872c3a8e9ee19da99e4b8

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections