General

  • Target

    Server.exe

  • Size

    36KB

  • MD5

    da332c85afedb0fb2fcde8b4076b925c

  • SHA1

    c938c87d5d805e7be993f896a4df857debb3a1a7

  • SHA256

    fbb05c261096220dff4705d9ef5ffa9edf1ceaf06bbe13a5a6a0fd32b805b4c1

  • SHA512

    517100f04cdae13ade4a2fc973e08a040637ae0e43117a423d73ce3f58ca6e7f3d1965717b1622feee74ae7fc496537ffbcf87f76582065c4f4ed285a035ff3c

  • SSDEEP

    384:pmOs0IiejvCVLO309QmykrtG+dA+VfwvOSiKrAF+rMRTyN/0L+EcoinblneHQM3a:7FdGdkrgYRwWS9rM+rMRa8NuBht

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

5.tcp.eu.ngrok.io:13720

Mutex

8e881e27f729ddc051903511c998ac73

Attributes
  • reg_key

    8e881e27f729ddc051903511c998ac73

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections