General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    bca1f67640ffa15311aef3f4467c0b20

  • SHA1

    54e30ca055b5943238a792d27a650ed8d7bd514a

  • SHA256

    832856f59d40dc3188e50dbc6539c8adefa2623cbfc1b4b59868068d35d2334d

  • SHA512

    5eb9459e982a4e7a62d14a8301a8def2133017789d5242e7461555bf42cceb4f19d80c057792bbe9c972a3e199f2f990614ee7a412e81aed616d3a258d880993

  • SSDEEP

    1536:h+RnEoSnsqS5ut9YMR8SjEwzGi1dDjDYgS:h+tSnsqS5uTYM+7i1dbB

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

85.234.6.210:1337

Mutex

f52da95616b807c21f8436210b3e9a16

Attributes
  • reg_key

    f52da95616b807c21f8436210b3e9a16

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections