General

  • Target

    ipServer.exe

  • Size

    37KB

  • MD5

    e055040e8da3d8e15703defa60bb2d56

  • SHA1

    f9e63aa863f2be68808465adcfe234c8ba65b8cc

  • SHA256

    ead271e84adf5320ddf098aecacb9956b77a77d43266fe4db7a7d0e795abf5ff

  • SHA512

    1e854a3b0c1a0cc804072c567a46ae571ce58541270b408dcd76f0131fdef7230b1bd6f2ec66290d6f7786ea9826f18876405ef77ecce708c6d26eda811e28e3

  • SSDEEP

    384:iVi5BkiypnDNGRn5IyUvQIlvNho/iGFIcrAF+rMRTyN/0L+EcoinblneHQM3epzv:wiS5M5jUvllwqGacrM+rMRa8Nuict

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

186.233.186.52:80

Mutex

c34161882a7351d6ed542e6100db7921

Attributes
  • reg_key

    c34161882a7351d6ed542e6100db7921

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ipServer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections