General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    ffacccd34fe6b956cc4c2675b683ebf4

  • SHA1

    edc28d7b4638e311f5f271c9563d1a54b327d08a

  • SHA256

    bf81dbd204ff172b316a8fedf108ed7e5f3da285c4ebb569a75a9de734284a87

  • SHA512

    7996f892cec9091638315325bd2d2a4d7f3618691568f46fda38366c4a8c83ebbf09e03b6e77925064618c0b2aa953bd97a5b08f2800af4540e8ad37e302e17d

  • SSDEEP

    384:OiVvEiTbTvpWNcZ0y8fvCv3v3cLkacparAF+rMRTyN/0L+EcoinblneHQM3epzXM:LV7TZ38fvCv3E1cQrM+rMRa8Nusrt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:13536

Mutex

e5836c30acd1dfe5c4fe7dd77da7989f

Attributes
  • reg_key

    e5836c30acd1dfe5c4fe7dd77da7989f

  • splitter

    |'|'|

Signatures

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections