General
-
Target
Server.exe
-
Size
37KB
-
MD5
af1c7927e6716fd75f9b157df21b417f
-
SHA1
404a3d5822f81a44223291da4b036094a7d8c9de
-
SHA256
fc1715a230a6a8edab55ae8222d4ac535974076f9247aae90b7faab18d0afc9d
-
SHA512
ac78a480904fef8bd4ee3dc4a23710fef1dc63ced991452b8b2734c5969ede615e69f238666a6039d1473901893994d207218dea7741cd418dbf87213f173b52
-
SSDEEP
384:FBTMUiDHblmJEpRGyEfBffXuKCYyEAnrAF+rMRTyN/0L+EcoinblneHQM3epzXk5:fTqHpR9EfBfWKClEOrM+rMRa8NuCrt
Malware Config
Extracted
njrat
im523
HacKed
4.tcp.eu.ngrok.io:10256
3e83b49e1c07ada2a187c8551629a511
-
reg_key
3e83b49e1c07ada2a187c8551629a511
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
Server.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ