General

  • Target

    Servers.exe

  • Size

    93KB

  • MD5

    11c3d736636d5acad291182340e6e647

  • SHA1

    e64cd1bfe00a133b377797b4fee57895ed277633

  • SHA256

    17f615a23b022f18f3d61c71e03ab634f21da34ae74b0db76763c6caa49cf7d1

  • SHA512

    eebf3190b0a0529376e4dbe1b54f40880f7a8b7d93dfebc8c3a09184ccc9a867b576aafce511701a36d95c1d0b66f1b5179a839056e401189270e46370d285e6

  • SSDEEP

    768:lY3D69hWXxyFcxovUKUJuROprXtwNheYhYbmXxrjEtCdnl2pi1Rz4Rk30sGdpPgM:I6TWhIUKcuOJ2PhBjEwzGi1dDMDPgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKedw

C2

hakim32.ddns.net:2000

5.tcp.eu.ngrok.io:15949

Mutex

e9825053491379a6131c11cac9dacb5a

Attributes
  • reg_key

    e9825053491379a6131c11cac9dacb5a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Servers.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections