General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    a2a6389fa716971140b0f1a36ed0266e

  • SHA1

    852996d578b766714cf2d27d0bd112ba4b9e4aba

  • SHA256

    63765772a863316c1c12bd62f61408be41d57a41c093df09136be36bd8a27605

  • SHA512

    f1497c11f7ea8edf6a0202b2cbcb5144f02f80ff95462c4b86f879c12872b7e8b5f61317eaf39bc88c957df9613ad95a853a5f6a30858c76b617bff1864367a4

  • SSDEEP

    1536:OUNJD/HBZbszKu9AZpE7r1jEwzGi1dDhDSgS:OUUzK4AZCHCi1dV3

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

158.255.214.24:2233

Mutex

eed4887112ef55fb4c16118450a10df2

Attributes
  • reg_key

    eed4887112ef55fb4c16118450a10df2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections