General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    ad185b3c650db0fa347fa6b28fd200d4

  • SHA1

    8b8e91aee9231fead2c1e844f4f89ee0fb375128

  • SHA256

    af8d289e7d88de7b99f7c92b3403f705ee548d50211acc3fe918af1b35abebea

  • SHA512

    1219a6911e276d7f4e5b71e7f053499ee99ffabbe665b03bab250eb25d1c794d1f17de5799e9e1e17d795bdc6635663f6dad9cf0ba1ae0a03a9d918063dd17af

  • SSDEEP

    1536:+gwC+xhUa9urgOBPRNvM4jEwzGi1dDYD+gS:+gmUa9urgObdGi1dOj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ip

C2

hakim32.ddns.net:2000

178.208.235.89:5552

Mutex

e74270309bb8d2554e60ab7d5d95cc86

Attributes
  • reg_key

    e74270309bb8d2554e60ab7d5d95cc86

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections