General

  • Target

    Payload.exe

  • Size

    54KB

  • MD5

    9b50d40dbf5594522b8c274f830c9a46

  • SHA1

    5292a799efdf0037896237aa81e0dfc080cebef1

  • SHA256

    72bedfaceebc5a42fd4ff690700fba1cba15a042c52769ba0ca303cbd545d49c

  • SHA512

    ef32a63ace3f3538680da1318b5c12d5e8e56e4304350e98c3ec27c8c107c50225a97295e9c377e4baf392ce96cbe5042d91d367150e75ed3944950eed857cc4

  • SSDEEP

    1536:cCEVGt9gmgpDGxJSMGKWQcGD8X3xIEpmlg:0VGtGmCGxJSMGKWQnD8X3xIEpm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

associates-studio.gl.at.ply.gg:55946

Mutex

63c41129dcdd177a39b9286624eb2f23

Attributes
  • reg_key

    63c41129dcdd177a39b9286624eb2f23

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections