General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    a1d98613743877e6909e48a7ef961f03

  • SHA1

    d5060ec77aa7b90457fb4e0bcf13ed6d15be9f50

  • SHA256

    68887219835e5a239f80790898cce4fa77ad3551bb131b71ebe7dc01303be047

  • SHA512

    4d3039abe72a4617ba6b8c0ad2810e8448e21b8424abd7d798a5dd396e4bc3d18ee4b0a6379cdd122b4c9ecdec7812a266a15fad233ac39bded4c8091f4576f3

  • SSDEEP

    384:u8GBkiyRnDNGRn5IyUvoIdf1bg/SuswxrAF+rMRTyN/0L+EcoinblneHQM3epzXO:RZ5M5jUvtdOaufxrM+rMRa8NuMjlt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

noob

C2

127.0.0.1:5552

Mutex

df4f4145ee2e48990df7a94a2e0f3561

Attributes
  • reg_key

    df4f4145ee2e48990df7a94a2e0f3561

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections