General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    537f4abe51e40e944ef668c753eedfc0

  • SHA1

    1be9efed53847eb046ceb9c5f6532280deba1eed

  • SHA256

    e5bfcb0c973a7f9094a377c2f5fafaf64e3032252c57414586f07f3c7c0acc9b

  • SHA512

    793c4baf1f2d43d3c6e52e73a637ec096a1d76c92df78ca52e154ed0b1e788fd89a57b5f663b6caacfbdb8bbe4f222c9e04db9b1f131475382d19f296b3b271c

  • SSDEEP

    768:17rNsKADtOHiR4akrCQ2llSvrM+rMRa8Nu/vf2t:17rctVSGQ2lkw+gRJNUf

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Vatlan test file

C2

6.tcp.eu.ngrok.io:18014

Mutex

c85c0ab34d30d35c1627cb33dcb1e023

Attributes
  • reg_key

    c85c0ab34d30d35c1627cb33dcb1e023

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections