General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    50adcc7da58a4c6e2f48e645092258ec

  • SHA1

    f75b5d93d39df3a2d38df25c2248ee67e1ea7e9c

  • SHA256

    e94867bea2f7d495d1483d372912edadaa5316bcfcf943534a073975bb10bdbb

  • SHA512

    09cb0a4c8910164ac55cbb1bd03b50ca010dc40a493eb09010d7b36f60ce4022026282cb152f608131cfefeaabfed6484c247ebab8911e9cb2bc410ad822f28f

  • SSDEEP

    768:GY3TlCm6h1ychQVHwUM7k+rhHX9jN2UQBi0yXxrjEtCdnl2pi1Rz4Rk33sGdpYgM:tlX6rCHwB4+r9KtcjEwzGi1dDjDYgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

18.ip.gl.ply.gg:10581

Mutex

2f7590babcd6e13bbaca22f0d393dee6

Attributes
  • reg_key

    2f7590babcd6e13bbaca22f0d393dee6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections