General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    5e38a9723ec007cb0bc0c7e205bee2d7

  • SHA1

    b764e79a552710efaf2866613d878b0fe70a3fa5

  • SHA256

    0a415aacf4dc90fe60344c8e25cdefe7c99196d5bee7ab7da4d427d336c77f49

  • SHA512

    2234b51628ad962dc4085a62a4c6f4ee7942931e3d65b26e11b7a7a13a050fa6560aaf36dbb8977640742b391e67e47b1f59ac30206a4a636f58dd2fffba0e6b

  • SSDEEP

    768:EY3yUy6xgrKSMZAZL28d20WdpXQHPurRnQmaiYXxrjEtCdnl2pi1Rz4Rk3isGdxK:+Ufxg1L2APWPsmUjEwzGi1dD+vIgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

lol

C2

hakim32.ddns.net:2000

opportunity-mandate.gl.at.ply.gg:18976

Mutex

50eee61395a3404f37565cca8fdcfd4a

Attributes
  • reg_key

    50eee61395a3404f37565cca8fdcfd4a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections