General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    a6f0603c9ece43f45bcc8399778d0b9f

  • SHA1

    98f4c1324978662e64d789955d35aaa0bd9de53c

  • SHA256

    7dedfbc7774d48af8619f983e92f1fa5d71f59a4f060d111ee55610ce76a8e0b

  • SHA512

    9e734a9dcb0e71c018f5ab2da3dcde6371b7373c4400492e6cbc6f586c649eae3807ca514a83f18fd0ab5d24e3763836f97a140cbde4cea66a7c9f9f2ca181cb

  • SSDEEP

    384:KAKnByEitvPJWtckUy8fuOmH1Ge9Pe8fKrAF+rMRTyN/0L+EcoinblneHQM3epzr:fKIzkX8fuOmUYeIKrM+rMRa8Nuv/t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

10.8.0.2:6882

Mutex

90650fd6f1d029a20fa1a6ad123800b2

Attributes
  • reg_key

    90650fd6f1d029a20fa1a6ad123800b2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections