General

  • Target

    Servers.exe

  • Size

    37KB

  • MD5

    5665a0ef3c4a6150e10b869fb59ad941

  • SHA1

    7fa2df340c220f3ecab70ad373110a1c23edadc0

  • SHA256

    4c51c9c2122e58bf806674edddf1c75d752b7b9eb8fce8113a5d35ee503dda96

  • SHA512

    d5733d3547fed591eb3aff392877789a71814681fd98796441a1d587be7b8a5e2bbc199d2a4956706890de4031538a2d33333f0f58424f8e7bda1775f11fb590

  • SSDEEP

    768:bNj8nAwJvtPrbAEgC4OrM+rMRa8NuA4t:bNwAwJ1DUEmR+gRJNH

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

ground-heavily.gl.at.ply.gg:5552

Mutex

3d5ac8ba8f05dd1075b6413d77ad5960

Attributes
  • reg_key

    3d5ac8ba8f05dd1075b6413d77ad5960

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Servers.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.