General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    813db85ab97727184483a1c116a70504

  • SHA1

    6b693b3f922284b15cec3f4da267ad5ff75b2540

  • SHA256

    6719cce8d2a4c4b4a1eb637ae3e476f923f9344a170e84d4d41fd747bf47319a

  • SHA512

    c1f407eaa8442622b0b9649f8e66699f4eaf46b84f960628fe56150fa8c74254f7481ecf880570079063f3faa3a91204ffe47f8b272b1e9077b163bb9cd73f57

  • SSDEEP

    1536:cUaPbwO9fJgowCrmnPiwxjEwzGi1dDUDigS:cUYwO5JgowCrmPdOi1dKH

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

147.185.221.19:54934:225

Mutex

7e810bdf55b3102fa6353960685e93b8

Attributes
  • reg_key

    7e810bdf55b3102fa6353960685e93b8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections