General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    dc6bc8ae6bfb9c6ffd987c9b38f14ffb

  • SHA1

    10e326ee7f1d2128668f90f9fb4e5c215708f232

  • SHA256

    c5a62b02157ce37c4d0f11b64e5691662555a222f1ad59c3a076f6f3ad812a40

  • SHA512

    7d5723ca0b1bbba8a28faa51f2f9028b22039e6b401b1f82b27de7ad9369640ca5b3f8d6683441d7b5bf805247b0569da5093ec0058ebaef52acedccf06a9193

  • SSDEEP

    384:0KjoUiFebK7FmpE8QyEfuifpefHCwHrAF+rMRTyN/0L+EcoinblneHQM3epzXoNM:Ft2n8LEfuiAvCurM+rMRa8NuK6t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

165d6ed988ac1dbec1627a1ca9899d84

Attributes
  • reg_key

    165d6ed988ac1dbec1627a1ca9899d84

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections