General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    4df32b61307af55a1af2834da73b1ba8

  • SHA1

    3b0d10a30541a44b379fc803eae7b517c4d8c49f

  • SHA256

    39449ed5c7216f72854dd70892f232a9bf18d2fadfa11815241e945fe8b9f693

  • SHA512

    14c8bb72a473f27018d438fd7377c5d05a31a35f5150446156721fadc15eba97fe69b6c65dd4de3982ca2628b09b3ef278e7c68a0ab153ec74698d60b15c4057

  • SSDEEP

    768:VY3MUgSgmnldjcRoMwrx7Y+DIkIITJbXX0pOtqux82WXxrjEtCdnl2pi1Rz4Rk3F:DUumlbrq+1NTZCOojEwzGi1dDlDHgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

223.27.104.5:5552

Mutex

98b71bccbab23604ef3120fd714656d8

Attributes
  • reg_key

    98b71bccbab23604ef3120fd714656d8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections