General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    36538a75154856f0b4f364edb32c862a

  • SHA1

    b232b4ac33db91f34ba211a576c5db2ebfe71bc2

  • SHA256

    20c41be47b63f5c9bbd4bac0860c7441487a52319aab77e34b8fb5b04d310955

  • SHA512

    7e2e383b91f13783693f19fa28705f412824ef71cf327381f7ca558131e767c5ee4a39b385a7ec2350f3791c85a10709b8ab8ea1fa919d5ad175b82c8f0e4d65

  • SSDEEP

    384:AAPaio1l7S5pbpQyEf/qVIPBJYaaVHrAF+rMRTyN/0L+EcoinblneHQM3epzX1NN:X53pLEfCVI/1ahrM+rMRa8NuDVt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed By ZguRt

C2

engine-cheers.gl.at.ply.gg:7436

Mutex

f14491b5bb389ebd0de3b07eccdd6055

Attributes
  • reg_key

    f14491b5bb389ebd0de3b07eccdd6055

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections