General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    37b90a300f36744b6fc9ce797b963a94

  • SHA1

    2d5456e337c04011f09cb98fffb35f409e7041b9

  • SHA256

    0d65edf0f9abb44623414395837b42e8b0e9b348435c7b00202976dfed4b96bc

  • SHA512

    68b6da47b0b61a47602a0ebd51aa5ed6988954a71700ed4b02d9843815fd22fe56506c1fdd79d52729f0f878024b23d613418eede72edbb2ad53032207faeb17

  • SSDEEP

    384:QXunmSIiejBCVLO309QmykrtsM9Wwffyv2A78rAF+rMRTyN/0L+EcoinblneHQMk:JbdGdkrCCHy+AgrM+rMRa8NucQJt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

tria

C2

mingrelian.duckdns.org:5552

Mutex

17276d02181a20b1af2084d1b88f360b

Attributes
  • reg_key

    17276d02181a20b1af2084d1b88f360b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.