General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    cfd5204562ace5e477eb476ab9a1fc2c

  • SHA1

    64044d8bdc6b16b99fa901b29c2c2f93e4acb672

  • SHA256

    447b696c982eb2cda50d3e34039455ea057ee798d8e3a04f99a168ea8de8b972

  • SHA512

    fa89b745cbdde2d4fdf4a0d1e2a6c18cd328ef19a379ba8ed30bc6072513b661a0da5dba96317b43fb0e00fa140ae3fc16fd39ea723ef5c3a9041ee8bd8d0049

  • SSDEEP

    384:Hamd23hUidkGXR21cGMy8Pqq53tGFlymkurAF+rMRTyN/0L+EcoinblneHQM3epj:6w23ZLGv8Pqq58imjrM+rMRa8NucSt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

197.61.152.178:5552

Mutex

974df33581f3c9ac0dbfa484eab41e91

Attributes
  • reg_key

    974df33581f3c9ac0dbfa484eab41e91

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections