General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    a2476fe1b61c21d0c21b6ac3cbf9e3fe

  • SHA1

    afb00002617984d684bf56adbc330936639d95f9

  • SHA256

    dde31c6ac236b7a39f441e7f8a18d1570f572877c8bc87686325c3e1ff837ac0

  • SHA512

    62a1ad8c0c63d299bbb71e4a52b79393cd2baf5f43c57f2397174bda5bc54791989aeeea3a720219636461e80e881a1543d2ffb6738b11394f03fb01b3c14819

  • SSDEEP

    768:sY3rwU6xgrKSMZAZL28d2WmtlX+RRoI++WuXxrjEtCdnl2pi1Rz4Rk3ZSsGdprgM:XwRxg1L2AZmDU+ajEwzGi1dDJ+DrgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

other-tours.gl.at.ply.gg:32481

Mutex

58dbb5a4cb58ef3b4156980abfe7a031

Attributes
  • reg_key

    58dbb5a4cb58ef3b4156980abfe7a031

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections