General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    04fef57f4e1143c35161babf4ae06b15

  • SHA1

    971ae6e7897b92e03b635dbec06d7f2423cb1a3a

  • SHA256

    19d5aa2ed1d9c5c315a871eb3445847315b831f3335a54806d64dbf62ba25264

  • SHA512

    e5f91c604769ccc136932646455215dd71c08e771228e022e4f871804ded3e1dd16fd54e7c9acb3d5942fc61e99012b8509cbcd30028cc1bc75822c3534e99ae

  • SSDEEP

    384:30RZLj6icdri5Z7JAyk/O4GfZdlZe6yN0rAF+rMRTyN/0L+EcoinblneHQM3epzs:kRLHJ7k/O4GjlZ7yirM+rMRa8NukHt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

notes-congress.gl.at.ply.gg :1111

Mutex

35a1fbfdf27f818abc062486b70cca6a

Attributes
  • reg_key

    35a1fbfdf27f818abc062486b70cca6a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections