General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    f1f1087e5bebc81b2f20f3f682714a33

  • SHA1

    e03c7f73f7814ad9fee82fb9406cf0481726ceed

  • SHA256

    ddcaed9b9f867bf4e05a810df799758025b359e1bd9377436e3c2399fc558d25

  • SHA512

    9f202179bd19930cc2d6e6df800fb57c926442ed8696ce40ed85831a324442f88c95e987054f4e1339bba4c763af80547be31b265819ec92e02964086af77b0d

  • SSDEEP

    1536:5Cy1GkeUqZJO5wNSimjEwzGi1dD/DYgS:5CdUqZJOeAOi1dHB

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

id-diesel.gl.at.ply.gg:1488

Mutex

f33d908802952a94f0ecb26fcb072ba8

Attributes
  • reg_key

    f33d908802952a94f0ecb26fcb072ba8

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections