General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    1fee2d9ff5cb2c2e5148dd29a9d4b9f9

  • SHA1

    e34fea7ef4f150e1fde9f66081d6c36c0dbef826

  • SHA256

    2fa426a6f0094ac4700b875fbd236651491ab3258e72a378d12b4be93c3dd454

  • SHA512

    9600b52b47ed15ff1c00578de669d497d36ebd7660ef018e687b5961604794d0ed10b85e02b7dcaba33837659b47c74882434861564a93d9cd51a5bbe4cdae77

  • SSDEEP

    384:VRmjKicg+jn5xL5oyUi8ithMjnP9KYC2DhrAF+rMRTyN/0L+EcoinblneHQM3epR:nmIf5DUi8GMjng12lrM+rMRa8NuDZt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Bezmamniy

C2

basic-values.gl.at.ply.gg:58503

Mutex

4b6699ab871e1185d9ebf603d91d567c

Attributes
  • reg_key

    4b6699ab871e1185d9ebf603d91d567c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections