General

  • Target

    Server.exe

  • Size

    43KB

  • MD5

    79c76b4ab15f7cbe52dbc4ecf0f5d5f1

  • SHA1

    6f8b639f93bd3a63bc059798d4c57fdc402634a2

  • SHA256

    a784dbe08abc8fe4f1d4049331d0ebde38cfb5ebcf8a8f52997489ca38297420

  • SHA512

    a92ad95bf93e505a087f574e61098bff3787a6143ebe86b179e4e0475e202fb6e44a1f3acd6fa90086dee3ca8494353a6d6bc4c13739383cdd525f36c3461ee2

  • SSDEEP

    384:gZyVBVK7U8yr1RLIog0EAnj8lR9UtzDgIij+ZsNO3PlpJKkkjh/TzF7pWnq/greH:GkBcY5r3LIJ8nj8lA3uXQ/oL3+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

data-dakota.gl.at.ply.gg:2094

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections