General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    cf9f9a41904924d61d94fb0901f7894d

  • SHA1

    26a6f6e41d381cf5365c5de4b1845c7b63083eb0

  • SHA256

    34a1f0370330418aea9fb96a9a14fc3cc7b2bc7f9109144e7d2a65b0ffa489d2

  • SHA512

    bd301f7a5d976aaa99f4c2df160ff2fe91c0125fb4046040c545b746b2e382506bcaab54cdac3f8ae42ec2ce505895b10345ed27114de0b27e1d15f12cc831ce

  • SSDEEP

    1536:8Vhs5p8k2HGjTpL5HoTjEwzGi1dDcD+gS:8Vrk2HGjtL5IYi1dCj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

asd

C2

hakim32.ddns.net:2000

tcp://0.tcp.jp.ngrok.io :18505

Mutex

84accb34a9787caf2e3bdbd53f84088d

Attributes
  • reg_key

    84accb34a9787caf2e3bdbd53f84088d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections