General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    c2d562eb562d738308ec8c626e273fa7

  • SHA1

    13c974309821af2365243584613b8651d778776f

  • SHA256

    725f7096c357e7cc3e67d6ca2d6f9559ea51e0463d0bdb6145f700d19313cae2

  • SHA512

    a009c9dcb383077d543427221c75fdc51c79bac0f241e0e474ab00d56881f8d7244e0ceaffc429eb771f88fa98c81a201c0cba258fcc111f9c0a5856c55eecea

  • SSDEEP

    1536:1hQnHYZpXajXb7bM7x7jEwzGi1dDcvtXgS:1hQmXajXb3M7xgi1dOtQ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

lol

C2

hakim32.ddns.net:2000

127.0.0.1:7771

Mutex

abc741ecb05984bbd50291473d666b22

Attributes
  • reg_key

    abc741ecb05984bbd50291473d666b22

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections