General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    34aa7e767b2cf0e269923ced86bd866e

  • SHA1

    f01601505b6638eb6b7afea3e9091d26041bd917

  • SHA256

    0aab952c91cb7e5a06c01ba4fd49f8cae95f342fd9dbf4380cc4e16f7af0b1d8

  • SHA512

    0d7c73dc725c576a1bf236bf941da84673f3143e53a51b9b763a800309a66a5d1fbf019fdc643919dacf0eb1855a6158fad81b5d979564d97450922acfb714e3

  • SSDEEP

    384:W9yBkiy3nDNGRn5IyUvWIvvnhC/iUtvCrAF+rMRTyN/0L+EcoinblneHQM3epzXe:Ur5M5jUvLv4qUUrM+rMRa8NuGHt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

tcp://6.tcp.eu.ngrok.io:15730

Mutex

1a36120e5020cc441c6bbfe30eae523f

Attributes
  • reg_key

    1a36120e5020cc441c6bbfe30eae523f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections