General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    053a8f3a584524e0d77484519cfa0559

  • SHA1

    36116b05dfccaea02a41e72a15b41696a6648659

  • SHA256

    c16cadaa949ddc744e43fc69b00e1773ff5e86c08b584b49527c581b84bde0af

  • SHA512

    a184de52bc0f6ddce50370648e33a2e29e51944bb86d196ede5684b2338462b0e375c0d3cb69cd4822bbad1deaaaa3b61557af896672ca04199c77a9555e9ed8

  • SSDEEP

    768:6Y33UnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3asGU:1UxOx6baIa9ROj00ljEwzGi1dD2DWgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:1177

Mutex

80c254619a21242c459e019cbfc8ce31

Attributes
  • reg_key

    80c254619a21242c459e019cbfc8ce31

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections