General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    a68e2b20d2e7e6ea383af62c89d68d9a

  • SHA1

    546ecddbc74a78096d186f4706456e756c702d04

  • SHA256

    f99ace26f23c75f83d60676a42a8d3ab28d1b1ff50dd02ba561b4ee3da9f9287

  • SHA512

    ccb8fbd8191f4a2db43ebd36f6eb00f76dce28ae092aa4d6ab12a2fd369f924845db5c4e60d62b624b61f2e9ab98537bd1642faf8b485843faaddb796cec0ef9

  • SSDEEP

    384:CKjoUiFebK7FmpE8QyEfuifpefHCwSrAF+rMRTyN/0L+EcoinblneHQM3epzXoNC:ft2n8LEfuiAvCzrM+rMRa8NuKct

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

165d6ed988ac1dbec1627a1ca9899d84

Attributes
  • reg_key

    165d6ed988ac1dbec1627a1ca9899d84

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections