General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    aaf3d5b54c562b1724da4218329c6429

  • SHA1

    7564987918bfe256ca54c40c92a8e08511c89695

  • SHA256

    98e9302fa9ec434208109607f439b4e93dc45ff3a1b2d043f978ed8d9487c37e

  • SHA512

    141ace81890f98eb49b61a52c41cde556c5fd991ee7ed630e88ba02a3ff0442c1ddfe5c3ea022d314843b134d8cd218136902faa3b3c58e29a4461258cfcbccb

  • SSDEEP

    384:Z6l+yw7BeAaXaEiVbzdmB0O4yUvNixgp+Z2v/RYJ/oM6IxrAF+rMRTyN/0L+Eco1:Ycyw79POTUvNZYv64rM+rMRa8NucFt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

89.109.50.181:5552

Mutex

645e0e0eff5d90d73700f74ce4405be5

Attributes
  • reg_key

    645e0e0eff5d90d73700f74ce4405be5

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections