General

  • Target

    server.exe

  • Size

    23KB

  • MD5

    59e36643cc69940256c9c104b84c313c

  • SHA1

    b716b1f72794a14986fedc9119ea4f24570977f1

  • SHA256

    7de64c17154c5d16839c3e583a788126f48493b1bfcd70148ed4f3862cebf033

  • SHA512

    ac65df8a56f2e9c10c917f8871e852058b4ee3200bacc518508982033866f69e0bd683e2a68889e8b73158e260eb021a427ab8a34ca839edb3c3215227ce2d76

  • SSDEEP

    384:goWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIj:v7O89p2rRpcnuZ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections