General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    dc39a37ae63c2456cd23252be31d3562

  • SHA1

    5ef126dc5b5e4cd2570016ff3afb53af1f6f4afe

  • SHA256

    560d49387e813dbf14946bfa1d7db5b4038a90f87feba2b846676ee99f8e7de0

  • SHA512

    d6c212b729497d199864c2b4119d88e0fda17f8a82d294127a38905baaf5a6430a2a8203fe63a98f5ad35d3260f8a6d758b84b030a1d6cc41aaf7df872e112e9

  • SSDEEP

    1536:j6K1GkeUqZJO5wNSimjEwzGi1dDUDigS:j61UqZJOeAOi1dCH

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

lesbian-organ.gl.at.ply.gg:38343

Mutex

236a28b95be2e64f419c0d11d3ee97c0

Attributes
  • reg_key

    236a28b95be2e64f419c0d11d3ee97c0

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections