General

  • Target

    Server1.exe

  • Size

    93KB

  • MD5

    4dce36abd4e8ebdacb2d5b2ab0501c8e

  • SHA1

    2e5d0d870491f0a4a169d8413295daf6ba5e5c03

  • SHA256

    76daf5c873658ba76c0df198f027a74f2c6bbfcb21c62d55cc3f58432d8425a9

  • SHA512

    b8b49b8b634e915bae38b68ee73129351807ea67b3f29964b85f25d0d5b925c6b51d4a57488b88b546875b7f446714129182fbb2fdb48ea79aa5311c9b1f6882

  • SSDEEP

    1536:3a/FQWqkqqoLc2mUiIjEwzGi1dDmDqgS:3a/mkqqoA2zi5i1d4v

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

programs-events.gl.at.ply.gg:18396

Mutex

6fe4eb498ebae4fbcd7b935a963e1f84

Attributes
  • reg_key

    6fe4eb498ebae4fbcd7b935a963e1f84

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server1.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections