General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    1c0e0635365312368a9576eeb8d73ba5

  • SHA1

    842c11c9b8f101e92565d6c61ae2fb06bada15ce

  • SHA256

    f7d1655402571e508ffde1b36b75322782c40fa9a269bc13a246220bf16bccb6

  • SHA512

    715de4c6f3f27d12f8c810b45bedd99459a2df20b095e809661b09eef1b7a20d2bf7aa6cd7d8a7530f31fe834c58a60970f055fc15b0e98c0750f0e8e1cb948c

  • SSDEEP

    768:vY33UYSgmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82WXxrjEtCdnl2pi1Rz4Rk3Z:WUmmlbrq+1NTZ0OojEwzGi1dDNDbgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:80

Mutex

80ce9eda551c4127bba4f3c5a1fc213b

Attributes
  • reg_key

    80ce9eda551c4127bba4f3c5a1fc213b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections