General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    2048ee0cc97d14dfd80834009c31a489

  • SHA1

    07e23526240bed2a58f7c5a762b1106d95f56583

  • SHA256

    b742d89d62b19360ce79eca174ba75cb31e6af920ae61f672cf9b5a083e0ff68

  • SHA512

    20131b3ff19b3d0dabb18a6c42a771118be09c59249ed4132ca94ec96619752072dbbad921150db7bdb401177552783478965e32ad1ed7cc4a20df36470717da

  • SSDEEP

    384:u31bwDgibFjpPu7w9qyMTiZ31Esm67prAF+rMRTyN/0L+EcoinblneHQM3epzXP2:skNN9ZMTiZm969rM+rMRa8NuRyt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed2

C2

147.185.221.21:3238

Mutex

52572875fb7927cdf566870e6b767d44

Attributes
  • reg_key

    52572875fb7927cdf566870e6b767d44

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections