General

  • Target

    Server.exe

  • Size

    23KB

  • MD5

    816c212420f832d5d3ce0158b2d5519e

  • SHA1

    278d08c54b9f7991afb5316932ccb4672f7a2562

  • SHA256

    edfc57c98a9aafd20c755984ca5c188c1a1e1c11b8efcc335fc5a232b637fd9c

  • SHA512

    f75d754368f4b45a95d829eb3bae081a6a2f06a45077a2dffefd7c667d8075b69b8f5c96600c44455e0f25760423e79db6ae37837caa7cfd5345082463a47855

  • SSDEEP

    384:jc6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZJO:YIU0tw3Rpcnur

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

land-sustained.gl.at.ply.gg:4356

Mutex

dce2dfe2889ecf9aea86ff70b4ad53ca

Attributes
  • reg_key

    dce2dfe2889ecf9aea86ff70b4ad53ca

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections