General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    4a596ec7500266f7b2f980f6566658a4

  • SHA1

    65898d9186952c8c5fd20fbce65c11d9efca05f5

  • SHA256

    44f816301100f263293e99bd1d23d5a3a8f6077c8a6744aa3051c9a10cf1fe4a

  • SHA512

    1a5de2d32cbb35cfb87c1fb7b95349454484eebbb1e5265198a3a623157c3eb64dfad1ecbe3e4d493d6169ecd237f411271096be843a3f9efccfbc86f8d6afc1

  • SSDEEP

    384:VeaehaNitpFbOn0aH2ykraYvVZGzfn0mRrAF+rMRTyN/0L+EcoinblneHQM3epzX:Qa/qNWtkraYtArn0urM+rMRa8NuWAt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

5.39.43.50:8096

Mutex

e8acd60ac26d480363a6663c078d7622

Attributes
  • reg_key

    e8acd60ac26d480363a6663c078d7622

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections