General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    9d87d89dce63478fe78b1a5f05355422

  • SHA1

    bf13fe1abbb36e8d2b306bc1d84cbeb48d913fd3

  • SHA256

    c3882658f6f47e01d7666343f82f35644395affb50151587e2babcda9a855613

  • SHA512

    558e9991bfa66cab4ad38ad1f0b414ba7e410cf46742ce4e12c3c457655a68feefbe6ad54feeb27ce6f14d981d9345f81fddf3c261bf1d5ac32d85ef5523bd7a

  • SSDEEP

    1536:7OpnEoSnsqS5ut9YMR8SjEwzGi1dDnDDgS:7OVSnsqS5uTYM+7i1dn8

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

193.161.193.99:38748

Mutex

8c8517cfc71305584f78f780dfd7c323

Attributes
  • reg_key

    8c8517cfc71305584f78f780dfd7c323

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections