General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    0333c33f525da54149f87825272acfdb

  • SHA1

    b7e327aec9fb7f3a30e423eee4d9c4f478f28284

  • SHA256

    71092352d29fc883060cd905e64edda207648be9d29bcf60b44e3b6ec26a5184

  • SHA512

    7a1d0ec9e9166897fb044cdca7547d0ae0957f456c4834abd46e294cf40a7bc44873bbf8f3f275692901182d992869e3fbbd08f8b28f6725281d5b296235190a

  • SSDEEP

    768:dY3IxtjglPPMJI08+EyrERm9hX+Dl3A461mXxrjEtCdnl2pi1Rz4Rk35sGdppgS7:XxJgdQ8+f4mXIA4tjEwzGi1dDpDpgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

f65ecf9ea2a3b66895d6467495d01e0c

Attributes
  • reg_key

    f65ecf9ea2a3b66895d6467495d01e0c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections