General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    4034a69d99f70bd0d76e5a70ea590baa

  • SHA1

    f2a0804bd0b8a51dc4eb3001d1326947d094ac99

  • SHA256

    43a5f32f3c8cf9ba7b744e523efadffeaf1569de029a2b9523a33107b149b293

  • SHA512

    3e82f4b456da9708b2f90186498822be2efbe47206eaf9b218028c45508483c81488df1f4a821e8f5882583701cfd9048012cda3b7980034e8ad19ff28319d5d

  • SSDEEP

    384:RclqiU154NLHdayszHtyPpzsobO7krAF+rMRTyN/0L+EcoinblneHQM3epzXqNrn:G/ZdJszHtyxVOIrM+rMRa8Nusft

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

auto-benjamin.gl.at.ply.gg:14881

Mutex

4b990d9e3c8493d571efe0841f918986

Attributes
  • reg_key

    4b990d9e3c8493d571efe0841f918986

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections