General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    1017e5b6de8a0c5b1dba9df5e897cd61

  • SHA1

    562ca58caaa643bd5de025a8f776f0ae02befc1c

  • SHA256

    94835feda11875acad5156be4e5415324de8d5565c0655a5a8466cc89bd62914

  • SHA512

    1b351487495d646b14b22ccf965c608e8faa7ee1c56394b717ed31c137f90d6fc748e9494cb32ed6ae88d6e6784d320fbebde2db1ae5e7ad10757bdd84f31275

  • SSDEEP

    384:Hv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXP:P5LHJ7k/G4ObZr6GrM+rMRa8Nu6g9vt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

ضحايا Repo

C2

147.185.221.21:49795

Mutex

f291972a40b718fa583ad65b4ccb4602

Attributes
  • reg_key

    f291972a40b718fa583ad65b4ccb4602

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections