General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    979620bc1359b9de0bc220fea066488e

  • SHA1

    8b6961bd845efca78397a087b921a9a2bf67f947

  • SHA256

    d746c289c394a087b2b35362073e8ce72e5a0c4c364781f8585d2446e837b720

  • SHA512

    321a789c495e5ea28475035c9be680fb6b05a691eb8b088467537676920fad1a119b2067d34082e2266585c1679d531493a4881b99fc7d08859c3f21ad2c903f

  • SSDEEP

    768:QY38og7FKghFchQVTqWnwz/1h3XE/plczxXSsvXxrjEtCdnl2pi1Rz4Rk3ngsGd/:BgpK6bTq8itNE4VhjEwzGi1dD4DxgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Далбаеб

C2

hakim32.ddns.net:2000

17.ip.gl.ply.gg:57514

Mutex

26730d3bdc249175ddd4ff7276367dc1

Attributes
  • reg_key

    26730d3bdc249175ddd4ff7276367dc1

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections