General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    15062ba230f527e89f2b6eb5de29de65

  • SHA1

    b49ea4cba1a182f5cfc29d72c46bbe640c7aa6fd

  • SHA256

    38a06aef6a9fdb5cf646b2e3a0fcb0ccdbc3219a3ac402a49e5d38d2abc2d619

  • SHA512

    92e7dc76778a0fa8f0ed52ed614340e8040514705f273893536bea2dbf1794bb6f01ecffe5e2da0d1a6623748cf5369c2cb325b0a8cdd2bb9e26328251731105

  • SSDEEP

    384:Vfsm3hUidkCXR21c7gyK7xMNdxDna/irAF+rMRTyN/0L+EcoinblneHQM3epzX8d:lsm31L7bK7xMpja6rM+rMRa8NuSXt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

VR

C2

7.tcp.eu.ngrok.io:16051

Mutex

c278e0e8d19ce883d30d111730509b8d

Attributes
  • reg_key

    c278e0e8d19ce883d30d111730509b8d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections