General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    13a32eb1f487cf7bfdfb0985b96e2b52

  • SHA1

    bb08471c000225c552f39922fbd494fb8631d367

  • SHA256

    c06eb083fa3e176dbfcb8c2b24bc40691b23836a2c84949fcacb523a1b2061f5

  • SHA512

    7f245bfe0ce789c3d83fb67ecb242b10c60ebfb8e9928c5e4f0e00cb754449b326d37e91c98499f9174ca848382384ce3a3051594cbe36a81dfc330b026d1e4b

  • SSDEEP

    768:fDkSdCNhszSDSMOxsIDrM+rMRa8NuW4t:fwSdCNGySMOZc+gRJN5

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

192.168.183.131:5552

Mutex

b0211dd24be920412d5e0bf11b2722f2

Attributes
  • reg_key

    b0211dd24be920412d5e0bf11b2722f2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections