General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    7f8b57afff65c9019d341f84a23b28bb

  • SHA1

    29475a9f8b316377ed2830dd4091eb34cbf15e12

  • SHA256

    8e89962f54510852bd4dd65c78c7e717b84f931d421a27c7f08d36eb094fe604

  • SHA512

    2bc6529c241e49fca6754e294e2e034154acaf112f91474946c53455997928ab0abf40ceb3087879d92d7478ef727023db51b54dc798381e2cd43fb58e4f3096

  • SSDEEP

    768:EY33UfhWXxyFcxovUKUJuROprXtWN8eYhYbmXxrjEtCdnl2pi1Rz4Rk3CsGdpQgM:rU5WhIUKcuOJhPhBjEwzGi1dDeDQgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

group-winy (1):9999

Mutex

2a9e082c98ec8fea5fdff5b58796b52e

Attributes
  • reg_key

    2a9e082c98ec8fea5fdff5b58796b52e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections