General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    e9341f32faa2c1bb9e6436a257e63e05

  • SHA1

    64f84a49f358f722ca7b4c5c8b78f0a67a92fc6c

  • SHA256

    698c080b55df56fea6dae655a500cfc684507907662261b4d258fdb465bb3893

  • SHA512

    fb47dd21481f235589d755b370055a63f7051adea9edd4fc58090c0021ce7ad7cda79d2e31e9ff156584b75485c73ec3de775d503c9a17ab0eda32faeabf431b

  • SSDEEP

    384:a8bDUiS+L1G5k2gyk/AkfVa/8M9usjrAF+rMRTyN/0L+EcoinblneHQM3epzXnNK:lbf32bk/AkoUM9uOrM+rMRa8NuZ8t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

lol

C2

127.0.0.1:5552

Mutex

e3aa528a939e53b12e0034edfcef9280

Attributes
  • reg_key

    e3aa528a939e53b12e0034edfcef9280

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections