General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    13cd46a5eb8b646c2cd750f4e9b3d4d6

  • SHA1

    9105e699f21dec42b1576b7fbd12fe5d31a0d27c

  • SHA256

    a6325fc6013fad487c39965c87b0b45cea072d93248b0da741a94f3e843fd7c4

  • SHA512

    5bfdd1c812102ec057cce3ea0d4a67974fca54857fb2606ac16c43659bb7acbe4896408613f91944e6c09899a3f954d6a5d18a749e1b52cd50d59d110d81201e

  • SSDEEP

    768:VY3oyU3hWXxyFcxovUKUJuROprXtWNzeYhYbmXxrjEtCdnl2pi1Rz4Rk3dsGdpR3:YURWhIUKcuOJ2PhBjEwzGi1dDtDRgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

bit-number.gl.at.ply.gg:80

Mutex

b61782f7e39d66f57eed02e71c1c2816

Attributes
  • reg_key

    b61782f7e39d66f57eed02e71c1c2816

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections