General

  • Target

    Server.exe

  • Size

    106KB

  • MD5

    d6addec5309d5ef7b3b4c608faab36b0

  • SHA1

    ad4d767e0d1eea218a59d6515c4d19b126c51833

  • SHA256

    9dd756e66c8eb04d57ed5b16b724b046a011094b1f24a91d1e102513241045f8

  • SHA512

    c370365de5eb1165fb2262f5b78c71bfdc54ba9fbdc4af5c1bb7f28a7b6f807511a1e7e3f9c42dee131d86744dcc326308825984bd4eda8605159bd227476704

  • SSDEEP

    1536:/0S+NhCmuhYwvXFmvM/n0Q1vOyHP1aed/y4ksv:/02muhR8OlvAed/nk

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

NS50Y3AuZXUubmdyb2suaW8Strik:MTM3MjA=

Mutex

d8d5c9fbb89e48110d8c10886319d083

Attributes
  • reg_key

    d8d5c9fbb89e48110d8c10886319d083

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections