General

  • Target

    Server3.exe

  • Size

    93KB

  • MD5

    9715c7ab9ae58bedaf49006c87eafc70

  • SHA1

    f25f068460feb70e92193aa1a6352354d4f4dd31

  • SHA256

    3b3abff977d8411289f5e1a9f73aea5c133055c194d4e29997e74b05fa3e0e29

  • SHA512

    cdde2adddc0a4d886de6e69ad0d5259902dbad140cd43f1e732b18a7aac772ecb763cc19bbde5bf22e63edf23723fd93fa4db9cf4d4f1d7add233c5ff0dbefd3

  • SSDEEP

    768:0Y3vCgyZnDQMMpAZrGSt6+tdxXYG+YcSoSVUIXxrjEtCdnl2pi1Rz4Rk3UsGdXE3:LC9ZD3rGWFtnVo4NjEwzGi1dDsxEgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

147.185.221.18:37615

Mutex

103add70cf210fc418af47d219bacd6e

Attributes
  • reg_key

    103add70cf210fc418af47d219bacd6e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server3.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections