General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    b9cf1bb8c4a5f80ec87bc1ded086b64f

  • SHA1

    eb6c7f5a17f6257d98c1fa0759236cddc9e0f082

  • SHA256

    e8f9517875141746cd93d61731764c16e89ddc2d5c4f019359d965450710c270

  • SHA512

    5d23790790f7ddd6e3305b5c7621ca23335252083345c2de31123b598b322a1391fb2b30feca6ce6c0040edb09f6a72859a13388d1ecf1bd60e789c00f837d6d

  • SSDEEP

    1536:KUVJD/HBZbszKu9AZp77r1jEwzGi1dDQD+gS:KUMzK4AZtHCi1d2j

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

192.121.102.199:808

Mutex

0d0d768c1f35972458c398dd26bd38d4

Attributes
  • reg_key

    0d0d768c1f35972458c398dd26bd38d4

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections