General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    8349dd3e7b863a68d1e50ceb8ab956f7

  • SHA1

    2bf24257fa12b8e6d815fe64f940336d1b45ae8a

  • SHA256

    aa80533af9d5e8ecb50d59cf8f39e4fe00101ba73aae36b03fbaf3ebc85a4a8f

  • SHA512

    9967cdcae9fbacdb87fbc89b178d3afd4249094f704b06d7ea572d6fd5c5274459e3fa5532b1141496efa917d78611db6d023a772bff109db1f7fb193dfc596b

  • SSDEEP

    384:Nf+jKicg8jn5xL5oyUi823Vujvf/IYisZzrAF+rMRTyN/0L+EcoinblneHQM3ep3:1+mf5DUi8wujv41s1rM+rMRa8NuXnt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

northern-suggested.gl.at.ply.gg:53098

Mutex

96d45e2f6c3e79d33012c71bc9080d70

Attributes
  • reg_key

    96d45e2f6c3e79d33012c71bc9080d70

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections