General

  • Target

    1Server.exe

  • Size

    93KB

  • MD5

    8681a6f132432a2a6d0ac369d34c9881

  • SHA1

    6f0fcb908884d4ec6b5a93222b3c2d2925df9de2

  • SHA256

    fb8065c0eb5fe7f4bee0b8d0adf6c9665f6347e333eb63e41c5b1f82d1c28302

  • SHA512

    f5bebc0001dfe1c4ba963aa94533a4e7afd709a6a46eac5183538c7b60c455e0d68d8d1ab6b671d862e8dff07503610e39b5dc704b160aefda21be2a8fb456b1

  • SSDEEP

    768:bY3GVRMaLJ7chQgIKt0eBD+QhnXlha8zGwCpXxrjEtCdnl2pi1Rz4Rk3GsGdp/gM:nVmalYIKx5+QdT6rjEwzGi1dDiD/gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

C2

hakim32.ddns.net:2000

tcp://0.tcp.jp.ngrok.io:18505

Mutex

6214b513365f5f1c63600255d15639e2

Attributes
  • reg_key

    6214b513365f5f1c63600255d15639e2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections