General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    61ac4862e4e215c23e1e7f3b622b4730

  • SHA1

    8190600dc3952a63aa60a928c08eda9bc3f44c10

  • SHA256

    d91b582e6c4e5caf91ddca8a1787990cfb22a63ed42dce4a34164b005d2e4950

  • SHA512

    bdb79880de15ec247fd5a70bb4b4000dfd059f9aed45b95adeaca4d1b8d7b908d81500a910a9d5dfe6ffe1ce1919a48b2526ef7542113da3d75fe4ac9062ac8d

  • SSDEEP

    768:tY3E6bnkpjTMpALPGMtsas88EtNXhE9Y1mxCXxrjEtCdnl2pi1Rz4Rk35sGdpKgM:j6DkVbPGHz88Ebb1pjEwzGi1dDJDKgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

mangaforme.cloud:1

Mutex

adc95410fb310f11893fc5c5b1f03e7f

Attributes
  • reg_key

    adc95410fb310f11893fc5c5b1f03e7f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections