General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    cb3953372d04e0120d10ee740d30f0bd

  • SHA1

    a07408d1dbb969db0962d4157c54fc08eb6739c9

  • SHA256

    e844e103e1529cf1a04374703c4b07045db99287f1a9ab13fc9b4adba4d18cbb

  • SHA512

    a4aaa2a736597d98999e2c92651a7b95805572c168a921550d199dba484d46abee480aa205ca9c347a7ec6c1334434f9c21a2c11b0fb0957a81e0aa4126f9733

  • SSDEEP

    384:N6l+yw7BeAaXaEiVbzdmB0O4yUvNixgp+Z2v/RYJ/oM6IxrAF+rMRTyN/0L+Ecox:kcyw79POTUvNZYv64rM+rMRa8NugVt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

192.168.0.163:5552

Mutex

faa5c8cc0501b4294d866af5f1de316e

Attributes
  • reg_key

    faa5c8cc0501b4294d866af5f1de316e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections