General

  • Target

    Server2.exe

  • Size

    37KB

  • MD5

    eb58ab61b4f6752137b47922b3fa3a21

  • SHA1

    df08cf24715c89aa84954587080b87d7ad33e56d

  • SHA256

    e74dfaa4c10425645b96135ef379febb8fd5a822708da089d22b98b9739cc844

  • SHA512

    bc1d4743b452c9a2cf6abc7b597b1b7a8c9993beb608f958b5425a2bb910e9e4b48c9c6d036ac32fba1474f0d0de7645313c20e71ea8684f866afdc1e2b438ed

  • SSDEEP

    384:z0BqiUD54NLHdayszTbUfblsWs7PrAF+rMRTyN/0L+EcoinblneHQM3epzX8NCnm:IhZdJszTbUh1szrM+rMRa8Nu+OWt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

every-unnecessary.gl.at.ply.gg:41021

Mutex

6f3457932b8896a88f738e8383f18e0a

Attributes
  • reg_key

    6f3457932b8896a88f738e8383f18e0a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections