General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    0683c7aa6477729151becf1305d3bb61

  • SHA1

    5ce5792e3a0485b741c62b110399e2dc879b13ec

  • SHA256

    fb481c100a8acd081248001c1490dcbb929100cba3c8a5de5589dcfbdf911ed4

  • SHA512

    6ab18367f36e48253318bed7bafb90105d4dff24b6b0ca7e1318015b37b89d03bc07a0fb2e768fde291c2e0fd4a284dafba3fdb505752f923c11a6b49c0db231

  • SSDEEP

    1536:kUPTr1IDavlZhbSKl9YdjEwzGi1dDYDBgS:kUPSDavlZIQmqi1dG+

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

florida-institutions.gl.at.ply.gg:1213

Mutex

bede65f1f944bbd91c3a41305ecc1040

Attributes
  • reg_key

    bede65f1f944bbd91c3a41305ecc1040

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections