General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    f3bbc3f54e4ee819b5a2d9df81d9e8f5

  • SHA1

    968c6fe421b096ed1508ade2bb9e4047e90a8b70

  • SHA256

    ba499adcbc4370ea5e33d079fa83d54cf96363db6a9e9514041f760a14a2f9f9

  • SHA512

    f9d58df358893a3f8497e0a61084db2d2c80f956c97d88cf48542ca467be1f09529941baf90f10ff179705a9f9fd895889e606e0a5ef3cf5ae3e1cfbac7aa67a

  • SSDEEP

    384:HiqBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3ep2:C35M5jUvairANsIQxrM+rMRa8NucFt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

17.ip.gl.ply.gg:23531

Mutex

afc026d0eb3ca5821d290383eefc4240

Attributes
  • reg_key

    afc026d0eb3ca5821d290383eefc4240

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections