General

  • Target

    Server.exe

  • Size

    23KB

  • MD5

    805359c5f11cfda28f40eae126a50b60

  • SHA1

    eb7a97e4163b8398e07d274de01ca766c1c712b0

  • SHA256

    f2f2166e07fb5f356379467829e3bbacf829daf2f1c3bad65adc48bc46321bdf

  • SHA512

    6ae84e8d07a5b2c77fdf5d52e741fe5e216a93189d805d785e7e0ae9d20dae5116680900936c0b08c3463ceaa3b68c4332387160aaaa5f174373868fe8132d09

  • SSDEEP

    384:+wTSiYWD2Z7w3CsJeiecww3fw6TgzeAh33RtmRvR6JZlbw8hqIusZzZM+i:1vZiBK1ekPRpcnuLx

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

five-sequences.gl.at.ply.gg:47561

Mutex

fb418118e3e8262e924c041317580359

Attributes
  • reg_key

    fb418118e3e8262e924c041317580359

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections