General

  • Target

    Servexxxr.exe

  • Size

    93KB

  • MD5

    bac3e3a27867ed4fec83edffd7cdf851

  • SHA1

    ee1339a375d50b0aa1459543f2aacaab5c810c9c

  • SHA256

    a2c863ccc540a385073d3b08ab8fb1ec6c1d23b599b57a13a604002cba27f2a4

  • SHA512

    09ca8b12914d0da03797f8b34c7cd5f6ea42e94919d0c40270b88a110ee285372ad910b506311662a77620426a03dbf8cc8daccb6e9c4ddf6ece060f428b4721

  • SSDEEP

    1536:1U33wHyNxrBhh5YLg1jEwzGi1dDbDEgS:1UKyNxrBhLggCi1dj9

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HACKER

C2

hakim32.ddns.net:2000

5683812xs-43939.portmap.host:43939

Mutex

034f8e9797562c715673bfe3dab67ef8

Attributes
  • reg_key

    034f8e9797562c715673bfe3dab67ef8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Servexxxr.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections