General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    912e7f63f43ec5f3f939609b5e58333e

  • SHA1

    0245b10632273c582f0c9d08aa9c7612d94dc47b

  • SHA256

    70df1d68db03aafeb19f53fca272c49890ad3cc65d6fc159a0b19068729e49bb

  • SHA512

    afd0959801563044bdc296d57c311a5d1b61c727c1e820abf13d6f5a47ce72b2cfc5ecbbc57d229ff047c570e9a3664cc2a6e142cf97b9261f6afe62b2afca55

  • SSDEEP

    768:YY3/yxD9O/pBcxYsbae6GIXb9pDX2KC98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk37st:fyDOx6baIa9R/j00ljEwzGi1dDHDMgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

THUNDER

C2

Ny50Y3Aubmdyb2suaW8Strik:MjEyMDA=

Mutex

6fd94b8863711e8e07ba3ef1dea874b0

Attributes
  • reg_key

    6fd94b8863711e8e07ba3ef1dea874b0

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections