General

  • Target

    Server.bat

  • Size

    92KB

  • MD5

    31cf7610d533e13ac42f50019b77eb10

  • SHA1

    d0cd2ffc6b1b1335b5e5751c710b55cda41a9ab6

  • SHA256

    367355deab363889cde4e9c942df2a3a7ff3a40168232e0d68a10eedfabd1582

  • SHA512

    fb689eb467f75454d116bccc1bb0db4a72b2a5e8d079beeea44ae16aee6c9a06cb1a5d89aede0530888fcd142dc111c26f81efc860a858439ee007d4f5ef5fd2

  • SSDEEP

    1536:7lXOD+aU57cxwHYoprNZY2Zs2GdbSuNm9Y2xj:7lXWxwHdnZ7XQm9Y2J

Score
10/10

Malware Config

Extracted

Family

njrat

C2

hakim32.ddns.net:2000

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.bat
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections