General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    14b67fc8b414e3699f3ed5fb1d170919

  • SHA1

    cfdd12a30a8f32d8001129b903e3251a3778ee42

  • SHA256

    5bdcec5be7bb1309697ea8efd7acaa4f5d4f78c772abd52075a77b49f2f6da52

  • SHA512

    43e98a0e599ba686dff049899f27be1d6c8e0c588db08d248eeb9baecd24d1e184d4ee5fb8767c99e9cf0045fdb373b80904092cb0504c8615185383e5b79fea

  • SSDEEP

    1536:LVbtHYZpXajbb7pQ7V7jEwzGi1dDNvtgS:LVbEXajbb1Q7Vgi1dZ6

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

lol

C2

hakim32.ddns.net:2000

127.0.0.1:7771

Mutex

5c506578757b6ba11bbef788c27a389d

Attributes
  • reg_key

    5c506578757b6ba11bbef788c27a389d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections