General

  • Target

    Server.exe

  • Size

    95KB

  • MD5

    2c5949bf0cd96709dcd7a697343ae789

  • SHA1

    0be47b60083a92dbeaa93bc5a9c3b7f4dfa5e6f9

  • SHA256

    8274f641196b8fbee842b526a5d38b0f42eed5ce3b3081f49c56da827dd73175

  • SHA512

    8e8ee83e6688cb0ba9aa3ca7eb5807d0d78ed218efc946b909a6db0913962547b08ce8aa47d483b1622df4a32aa15474625150cc6af871a866baedd6012fc783

  • SSDEEP

    768:K7LeNXwlhgDZKUHZanCE8qlmeXBKh0p29SgRtrb:K7LE705KhG29jtrb

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:80

Mutex

8515eb34d8f9de5af815466e9715b3e5

Attributes
  • reg_key

    8515eb34d8f9de5af815466e9715b3e5

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections