General

  • Target

    Server.exe

  • Size

    23KB

  • MD5

    ee4fd408afc4a6e8e001c4fc7838989f

  • SHA1

    922dc36c22e8d05d56cc6cc82664b90cc39d66b3

  • SHA256

    82b8b08604298bfc72530734624cc20310c29fddae3dff3cf2d1325ee9084b17

  • SHA512

    940a12885be89a9e457b635a2416eeec11f8e3d379e5206c45c0be6063699afcbbd42fa80a453ab55672fbbcd3b9ad7f650139ef0a09692c57acf8e8b18a7008

  • SSDEEP

    384:s0jeCIYTNQZUuQnJXJeCXlwhPQ6VgDOwBHhdmRvR6JZlbw8hqIusZzZJ+:T3jNAU/ZVX6Rpcnu3

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

five-sequences.gl.at.ply.gg:47561

Mutex

c7c83ce9909baf9a2983a105aeb7e04b

Attributes
  • reg_key

    c7c83ce9909baf9a2983a105aeb7e04b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections