General

  • Target

    Payload.exe

  • Size

    54KB

  • MD5

    5fb47c7a1086f6280cdb8090c59333bc

  • SHA1

    d4b43a6354f5408bbabbb5efd0dbae20a92fd8ac

  • SHA256

    3498eee678023c712879dcbfc117b9c600001eb01a9a1c77f7a6a1b71ae4bfbe

  • SHA512

    ae84d58639c0a2f3632497272b72a759d050be0e321471d158df1e9cc7b1365be10c6aa495f2aedc194dc561dec1b214e7a5a59e41faf55f05dc8cc7ffce3862

  • SSDEEP

    768:KyAXUCTZPr2EsltNtNX0UL3msJSN3xWQG35bmaePD5PvS2XXJdxIEpmfg:KyyThGtNtrL/GBWQcGDtX3xIEpmfg

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

nickiwhicki-39201.portmap.host:39201

Mutex

2819883ce9929d6f93eae4f3b4a4bb7d

Attributes
  • reg_key

    2819883ce9929d6f93eae4f3b4a4bb7d

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections