General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    92c80777998fb2d7cf4a89e3c0485c32

  • SHA1

    1af70450af73c0a589ed7c0eb07e6c5cf800f319

  • SHA256

    3b6074646068cfd2536df69f95c2b7d45ea1ca196098bede73a9dbdcba8e96e5

  • SHA512

    711d2485afb622c2769b7485b920651676699386458ab301eae23207973463afe8f2fc53df045d9ebb764d1ce16b45c68384e1dbd2679a1a30837bb4dc32b92c

  • SSDEEP

    384:9FGBkiyRnDNGRn5IyUvoIdf1hg/SuswcrAF+rMRTyN/0L+EcoinblneHQM3epzXx:DZ5M5jUvtdAaufcrM+rMRa8NuzZt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

hacked

C2

185.204.1.236:1111

Mutex

c15cd7ce3aae2bd6036dd10a665f69f9

Attributes
  • reg_key

    c15cd7ce3aae2bd6036dd10a665f69f9

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections