General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    0ceb4f5cf4dde9a4641c6575f78f72ab

  • SHA1

    eb9f46fc0fafd4fd80321444ce642529366534de

  • SHA256

    d9be23f04b3af31b16247e792983bd73bf6016c05822614afe545b9f7c291a79

  • SHA512

    3f08b4c2f6b7c4c76f27b73a0e1ac911352c70ebd26b13da11ef64591bd3111b9d253f466815d89960c3bf103afb0d5d9561237a1d250593521355babd87915e

  • SSDEEP

    384:sNQCT0i9HdTe/kCOyU73oflQDXSikrAF+rMRTyN/0L+EcoinblneHQM3epzXqNrJ:yVt1CFU73oSDSPrM+rMRa8NuA9t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

BOT

C2

4.tcp.eu.ngrok.io:18513

Mutex

34c94d9c82c8d0957f3390d81057eaa8

Attributes
  • reg_key

    34c94d9c82c8d0957f3390d81057eaa8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections