General

  • Target

    server.exe

  • Size

    55KB

  • MD5

    fc67f392577eba1cbfb80432ae05b4cf

  • SHA1

    d9778afe0c162921eb0b6d0a01fd7400acf5c900

  • SHA256

    e1da7118dbe35fbee4292a15e3a6917adb85a0301b51905b9ab762b633fc3bf5

  • SHA512

    217c4417ec52e37b52e132b3c66e01add9b0eb3bd8824553ef0feff961ebdff399893d1ae2bd27c0c5a99fd1aab4ce0d897fdd292670a3f806c8afaead9b7f43

  • SSDEEP

    1536:F3mIDn/NOryWhI0DGwsNMDCXExI3pmim:QIDnE+v0DGwsNMDCXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

test port

C2

away-displays.gl.at.ply.gg:26917

Mutex

3cbadab69f166e4f209f232a3b7d0c12

Attributes
  • reg_key

    3cbadab69f166e4f209f232a3b7d0c12

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections