General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    9c27a6c88db8b8c557678ada12d44a88

  • SHA1

    bc6c5746c5ae979ce13f1b9174f85b55a80b3510

  • SHA256

    144850e26e3a185ffae1907451fefe19df0fd84f57cf71337775659e3887adde

  • SHA512

    feb4ae41c66be99a2592d3f4a8178e509bd90662c9f8be6e4ce6083e7dfe3bede3cbbe9b8e17aa9195364f001c56ee69d393fd7179d3af22fb6cb5c72a736a3a

  • SSDEEP

    384:Ure13CiMj3jBVbQAyK7dq/j13vAsGoNvrAF+rMRTyN/0L+EcoinblneHQM3epzXV:sxbQ7K7d8yNoNrM+rMRa8NuqOt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

child-pearl.gl.at.ply.gg:60000

Mutex

4c3b120e545cbb38e69c01a18a324913

Attributes
  • reg_key

    4c3b120e545cbb38e69c01a18a324913

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections