General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    ad728ad5539c5af474b79fda2f015c40

  • SHA1

    16b131079b93fdefc0d29c813c975ede496c65d2

  • SHA256

    4f2af0c255560149cb6eb1b2726fa15e655d229f2fcf4b96116a68e3ec59b00b

  • SHA512

    d239481f83137159fb34fbfdd83dd60107ca362789d0843c60f903a2aceb64b42e0a9fedd87236e40e685baac64b5d54b5b087165bfec2500795a057c6aac1a7

  • SSDEEP

    768:xY3zKBD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3tsG9:0KzOx6baIa9RPj00ljEwzGi1dD9DJgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

58545cc3d8c7a250b6c898ea8af2bde3

Attributes
  • reg_key

    58545cc3d8c7a250b6c898ea8af2bde3

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections