General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    dc76d82653fb0ab4f222c0cde02b0f05

  • SHA1

    c4a5346068f7b4bf2031695811bd9b68dc823162

  • SHA256

    40382cde5781500679fb27358962ac6b025807d50ddd622963fa4ab11ae363f2

  • SHA512

    12bd6e6957d2a83996bca4574261ad777a2b92b2716a0dfbc10965f78f9f0bdbf3a3bb9d4cb6d88a02417a141b610425b5e5df0816e8cd6a12c4d43afed10407

  • SSDEEP

    384:1OZZDj6iclri5Z7JAyk/m4uvBxZeaaFMrAF+rMRTyN/0L+EcoinblneHQM3epzXC:IZLHJ7k/m4ubZrairM+rMRa8NuDMt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Pidrila

C2

tcp://0.tcp.eu.ngrok.io:12876:5552

Mutex

ef95f74e8d0bd0ab5ea351a976a7cb09

Attributes
  • reg_key

    ef95f74e8d0bd0ab5ea351a976a7cb09

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections