General

  • Target

    Server.bat

  • Size

    10.0MB

  • MD5

    849ea210df0391e985bcfb74492f4afa

  • SHA1

    6bfdf769cda2d8971c851522b4371fc3654fa239

  • SHA256

    59db45e82e7b5bb1c6d984e935a606807c2a81c5893d0407670d54a8e8aa66c6

  • SHA512

    f01a50cb3b4e003457d26addc79c226c0253e1ed603671906895545f3b2cbef75a4598ef359075b33328e9a18f6d871dfe4853c0ed854193368906a2f23c1bac

  • SSDEEP

    768:QY365fhWXxyFcxovUKUJuROprXtWN8eYhYbmXxrjEtCdnl2pi1Rz4Rk3QsGdpxgM:i55WhIUKcuOJhPhBjEwzGi1dDIDxgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok:19282

Mutex

986511ea4621506f68ea7202a34087eb

Attributes
  • reg_key

    986511ea4621506f68ea7202a34087eb

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.bat
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections