General

  • Target

    Payload.exe

  • Size

    54KB

  • MD5

    81e043b5ee1e8931c5ac4d6f79457590

  • SHA1

    616f70b905d99605586de3fa2997135812f9faa1

  • SHA256

    15e516db2e5992ec2ab10969b8b0fef5f86d37f3720cb3a738011fa3ca56a622

  • SHA512

    e4933e3897f65a54b25f8e97084ab045b96b6645cb3a3ccdab80c0fd29dffdbf5f53a84b4a62c74d5190a3515b01226843b1f18da8f8768e667f7e97a9ee3e64

  • SSDEEP

    1536:r3EVGt9gmgpDGxJSMGFWQcGD8X3xIEpm3g:QVGtGmCGxJSMGFWQnD8X3xIEpm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

associates-studio.gl.at.ply.gg:55946

Mutex

63c41129dcdd177a39b9286624eb2f23

Attributes
  • reg_key

    63c41129dcdd177a39b9286624eb2f23

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections