General

  • Target

    Server.exe

  • Size

    103KB

  • MD5

    a1378e2e23730c3eea9605b5946a2a25

  • SHA1

    e845ab7f0c69ec40df6bde9a0bbddf18f79900d6

  • SHA256

    e36aab4cd8fc181e5b3267cb5e75c8709c404790268364490905625032cec7e6

  • SHA512

    fbfb2c794a902c9b410e94f717af3884e1b516b9baf05fe0e8f7dba4e8a454aca1a30a903c05a2d830308530521e9a47a42150b1683ec5eeb37a43fd81d0a2e6

  • SSDEEP

    768:TCg/lLJfcP7139+6rM+rMRa8NuIptEqiFACjISnH:TCg/lLJUD13Yl+gRJNHIqiFACjISnH

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

TEST RAT

C2

7.tcp.eu.ngrok.io:18819:1337

Mutex

a971dffcfbd4095dec935e254b3a4949

Attributes
  • reg_key

    a971dffcfbd4095dec935e254b3a4949

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections