General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    b52996195bd6af110e82523da49f7bd9

  • SHA1

    9a85fa621679d1629b15f6ed2953f4d7665f5091

  • SHA256

    6a65ffab90209b9a5fad0523b2878228f7062afc4679742d1efa0e77f419a8d8

  • SHA512

    6095f9e45461964c0ba27c1d252c579ac4f080a6b9da8363d6ad84836cc09775e3f4da9ca3eba44fb9df623d3d9f0dd089b35ed91bdc601c418030cb06d64e08

  • SSDEEP

    384:63OqIiuhjtD+P3V+y0bLqXOtHBEs++LhrAF+rMRTyN/0L+EcoinblneHQM3epzXO:TpmV10bLqXOtyN+9rM+rMRa8NuWpht

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

scammer

C2

topics-junior.at.ply.gg:45283

Mutex

87fbb7d05011dd3c6b564f136007bf19

Attributes
  • reg_key

    87fbb7d05011dd3c6b564f136007bf19

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections