General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    90ac8a759ee08383aae9e92c55550701

  • SHA1

    acb356c4b297f8072e744955a35b52ffb1f403d2

  • SHA256

    d1e1a276ad4820f0472c8acac3f9d17d3bcd64bbe35f5c38148533f1f5b14603

  • SHA512

    19363a421ea763a0e5befab5134fdb90d8eee4a45ede263ca4abbd92c71a454c2cab4b9dca32d1480bedc335df79830795580d93f33afae2d364b51310e92fdd

  • SSDEEP

    1536:h+IYW6qbkW8aVpO1ARkoojEwzGi1dDUDxgS:h+88aVpO2SCi1dqu

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

values-dice.gl.at.ply.gg:67576567

Mutex

7c19e8f3730b35d0f4a54a9c8fb6c824

Attributes
  • reg_key

    7c19e8f3730b35d0f4a54a9c8fb6c824

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections