General

  • Target

    rrrServer.exe

  • Size

    93KB

  • MD5

    ce2af732afc7f49ed2a33fe9ca4973c0

  • SHA1

    3a595322305cd5728dee1f8e0edfcb2baca5e20d

  • SHA256

    1c8ad2d3edf85ee66ce0735cd809063d6ffa7b07ad261106621174bd25d2bcc0

  • SHA512

    edd06d5c2d79bfe53d911de64e12e4aa52669afd8e5f0f91642fd7fb3713c0d9c8c6effe93c12d22e21845b4d67954654079f9c35e0a1e1c5a0c252389c21434

  • SSDEEP

    768:2Y30YMUiu5LVMZASgeArRKm6t0XJmmm6gaeG+KXxrjEtCdnl2pi1Rz4Rk3tsGdpH:mYMputRe2Rx6koab9jEwzGi1dD9D3gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

147.185.221.18:37615

Mutex

4ca7ea912d08da37869d1251c09733c8

Attributes
  • reg_key

    4ca7ea912d08da37869d1251c09733c8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • rrrServer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections