General

  • Target

    Server.exe

  • Size

    23KB

  • MD5

    a92ef911215a303fc49de97c4c6d837f

  • SHA1

    cfbb4b778d946dde68746cc8160f75f02f975d1a

  • SHA256

    cd9c6c3774a1465f229f729469ac9a73561f883a3f980625198571dc9c82a4c4

  • SHA512

    7ebce5b426033cdf54bb006f2c8ceb3a47cb49b4cf7207c65425df535e707b27a2b4a901dd297ba14955a4ad873bfe76ca2442a18ad73db51f9b957c9645a615

  • SSDEEP

    384:yY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZmM:lL2s+tRyRpcnus

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

needforrat.hopto.org:7772

Mutex

47b887645f4457386c0b55e0a170685a

Attributes
  • reg_key

    47b887645f4457386c0b55e0a170685a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections