General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    b015b845db4711beb964b1986bae64b5

  • SHA1

    9697eb6ea14d8750b1d824953abea4d1d2ff7e30

  • SHA256

    1beb53dc4eefd87e33a538d13362142c5ffb036a7e59247b8baeba345798a8b9

  • SHA512

    f9c0549a9e9aaaa62a33a5446ca65572e0a92abedc97ef681386a2b8741359c35745018dd7e8f8fe68af82307725198552485f99f3aa9250f39dda9e1a586d83

  • SSDEEP

    384:k0BqiUD54NLHdayszTbUfblsWs7mrAF+rMRTyN/0L+EcoinblneHQM3epzX8NCnZ:7hZdJszTbUh1sqrM+rMRa8Nu+St

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

every-unnecessary.gl.at.ply.gg:41021

Mutex

6f3457932b8896a88f738e8383f18e0a

Attributes
  • reg_key

    6f3457932b8896a88f738e8383f18e0a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections