General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    91e4afec3344ea9db7116cd18a8cb9e1

  • SHA1

    e2fae8861501ed0d6dea07a1ab587d0826f8e421

  • SHA256

    ee47d8ef5e34889b665b9f0f32dec4fe42e70c6c818053987816bb791f0d41bc

  • SHA512

    39daaad02e4c06d517e068e724534c366053cd6a0bf55e5d9d2f7e16f0813aa6fd08a5c3ccacf4a7851ade897f8e07efd8d2106bf97bb3e59ca83423568f7a1b

  • SSDEEP

    384:1SDMiLdBndznNCyMGmpcaPxzcG2DrhrAF+rMRTyN/0L+EcoinblneHQM3epzXGNB:0RRNRMGmp9J123hrM+rMRa8NuEJt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

answers-crisis.gl.at.ply.gg:60000

Mutex

581039bc9ef5d1d8ddead6e46f3929b8

Attributes
  • reg_key

    581039bc9ef5d1d8ddead6e46f3929b8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections