General

  • Target

    Server.exe

  • Size

    43KB

  • MD5

    e04b3adcc9fa2fdaec9711ea75191613

  • SHA1

    6c45071ff18b7484078629c7ad95d3c78b26f8e5

  • SHA256

    6fd6a3b341c311094502b2e8970797912f452caea2f8c2ab0af6f64a45df0ef2

  • SHA512

    aa8b4ad829fce0701e763f8c890f185e0429e1e72043446c23e53aaac42f764fa4744e15f573b7253f30eafede8fab2df7b9ad6e5c7b5b9d7cc71a30481719f5

  • SSDEEP

    384:iZy+Hl9n1iDcsyEqt3ptKwQsElGhOEazcIij+ZsNO3PlpJKkkjh/TzF7pWn5mgra:Q99nU4pEqt5tKhohuuXQ/o8C+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections