General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    f9b6ad30be032ceb2b5e39aaccafb559

  • SHA1

    1727e623b758d12d165b234b3de37c23367c7fe5

  • SHA256

    794e704c7eae31565db2f0474afdd29c856064d83924931f14df2a0753e78f65

  • SHA512

    f5e5bf5dca7b84c28b93eda9deff5a703da1e289ee66599447fc8078764a998de15a9ecb7da2aa9d087300d6ec74cf8b870e3769cde44a691b4e9ea68764d571

  • SSDEEP

    768:PY33UYSgmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82WXxrjEtCdnl2pi1Rz4Rk3c:2Ummlbrq+1NTZ0OojEwzGi1dDND4gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:80

Mutex

80ce9eda551c4127bba4f3c5a1fc213b

Attributes
  • reg_key

    80ce9eda551c4127bba4f3c5a1fc213b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections