General

  • Target

    Server (1).exe

  • Size

    93KB

  • MD5

    c0f1fbb61f88788419387ce93abd5afa

  • SHA1

    9cf46624a194fbaa51b7f15154890e2a87129b25

  • SHA256

    f1801a139c63b2677818e1aeae7033fbfc46af3262b2478f14469564aee049fa

  • SHA512

    dd969b4ed6331f240d6197cdcece1b3909e4359249730a28ebfc84d74b0febeda40a3b08c109e0cb73c0d51c6464e7f43028fb46d02bbbafb592fcdfa6fe440e

  • SSDEEP

    768:FY3LxnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3msGx:ExxOx6baIa9RZj00ljEwzGi1dDiDlgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOTI3LjAuFRANSESCOC4x:NTU1Mg==

Mutex

3f9b632bf515d26e6e26711a7e3b3df6

Attributes
  • reg_key

    3f9b632bf515d26e6e26711a7e3b3df6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server (1).exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections