General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    20275e6d49699b4d80e01b7f2e1694ac

  • SHA1

    adbc52b1f2c1d491bc5adc926e4a7e63d1d9fd7c

  • SHA256

    4ea592a89a5c055e04899916f29c16544ffeda5753ce2f4cb661b264a4d06682

  • SHA512

    a645954c49df609acf83137e8e4daca809cac1a69910d8611de375623fb1a9be9241fba5f69c2f780d0ace54dbdfc14e7dd7cc5425995788b6c14be363e39bfc

  • SSDEEP

    384:DKj5UiFebK7FmpE8QyEfuifpefHCwHrAF+rMRTyN/0L+EcoinblneHQM3epzXSNw:e42n8LEfuiAvCurM+rMRa8NuwGt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:8096

Mutex

0a87477a5205746534e21a83b88d3a97

Attributes
  • reg_key

    0a87477a5205746534e21a83b88d3a97

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections