General

  • Target

    Server.exe

  • Size

    46KB

  • MD5

    7a7e1c0156ab5b6522a96f56b4d2532f

  • SHA1

    2f700676cb267073eae3cdd1ce50c694c1969165

  • SHA256

    6935b28a712d78981118bcb0fc370cc7a78c95f9fdfbfe404e0a6189f308c418

  • SHA512

    660b59db738f9e5328c08ae50355a860eb0470022595f3e55e03895251759409b05749050380efd9ec5d2236e8582f854ea76d1445aca6a4253392ee207ae3d4

  • SSDEEP

    768:Bi2n8LEfaNw4EsI7rM+rMRa8NuTstdcG6:Bi2n8wsw4YE+gRJNE1

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

LOX

C2

5.tcp.eu.ngrok.io:13678

Mutex

ec0aceef114571c9284eb363d4836d6e

Attributes
  • reg_key

    ec0aceef114571c9284eb363d4836d6e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections