General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    57e1aae72406aecb9418ea6b9900d24f

  • SHA1

    b1eb7cf67e69c5ecaea4df806d5e17913485c048

  • SHA256

    baa50398d0c735b6f72a76093ed875a27ec9d60d900ecd50d396f5bc2bdf9cf2

  • SHA512

    1937e3b729ad249f7e0c0ea3ad11d2af6bd6f237833d4779d8a758ae307c76b9b8c2b47910c42f3228411695ba5a4c0a78cab2c8e8693d342750f2495cf20196

  • SSDEEP

    768:OY3rUnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk31sGS:tUxOx6baIa9RZj00ljEwzGi1dDFDcgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

hkmtdr.ddns.net:6522

Mutex

3fe8a9a3f17c479411fdaf6e87365c0c

Attributes
  • reg_key

    3fe8a9a3f17c479411fdaf6e87365c0c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections