General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    ce763524e75e476ffad92d1b319ba444

  • SHA1

    245038f6a6b95a75c3280ce2b7f6515f2cd53415

  • SHA256

    463baab4f638495506de26af0c97e91005983b786554f04ca8aa5e115f938c0a

  • SHA512

    50d2b297763e14e4a97253df620508d6e0b0a5d234906db9ee036196c0af615765ff7fcad6c30822372a7449dfec3bc19b679792e15c868158f8db4be8d4737c

  • SSDEEP

    384:ro2K3hUidkkXR21cGMy8PAM5vf8Fl6EAkrAF+rMRTyN/0L+EcoinblneHQM3epzF:E2K3TLGv8PAM58qE9rM+rMRa8NuXJt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

harrypotta.ddns.net:12999

Mutex

26690afb9b8b1f373190d7f7c38cda09

Attributes
  • reg_key

    26690afb9b8b1f373190d7f7c38cda09

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections