General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    e95bd77d095fbdd8bd9f5ab5046392f4

  • SHA1

    f337cf585d2f977f8a32860d7f384f1c9d902aa3

  • SHA256

    46a4549156b0348a917627ef668a9bb7cf96a3d313510858322defbc6e03e222

  • SHA512

    2e29f3f55bcbe759931a3d6752bb8f466d9c5d16f45d6f20ddd94b997afe924e6b3732acff4710193241d2d7f4d774c1ba8406708f3427a5134ee616c38851b6

  • SSDEEP

    768:q7rtsKADtOHiR4akrYBQWllykrM+rMRa8NuLOt:q7r8tVSkBQWlEH+gRJNc

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

parties-enabled.gl.at.ply.gg:57938

Mutex

4ee5f189582890a69270ea48ffc99621

Attributes
  • reg_key

    4ee5f189582890a69270ea48ffc99621

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections