General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    f82afc179bdf1690e17cb47e37559528

  • SHA1

    30afcaeb514b3b614ee56051f522600ef2dab338

  • SHA256

    cc4dec3e90440bf28e203ee73eea2810550496bea354a4f6cf5a956ee8e145e2

  • SHA512

    e903bc3005091aabc06852b0c723e1df3af6227f00ea447e0cd269272598b655fcac2e2ee85cd6ee50cc22b71f675be2c126db47fdc42d9760196876e5c08d24

  • SSDEEP

    384:ePwZCiT9SLDHGhlbJcycPrvQJmUP/cw6EABrAF+rMRTyN/0L+EcoinblneHQM3e4:mo1rJ/cPromUc1EIrM+rMRa8NuUlt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Realtek Driver Manager

C2

4.tcp.eu.ngrok.io:10948

Mutex

55ea697ee20f0a90e954d6a5f3eef13b

Attributes
  • reg_key

    55ea697ee20f0a90e954d6a5f3eef13b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections