General

  • Target

    Serverd.exe

  • Size

    37KB

  • MD5

    163c68ade4fd333a444f07030cec2213

  • SHA1

    8154ae3cb1ea1a89b00bcaf9ac29dce6c400ba32

  • SHA256

    d0c46a077a136a79acdf0bcc634213527f8f1320ce82530ef6c1b15f2e8aeaee

  • SHA512

    e886db439d2677938cbca429104e276c52f9a400cc119f2e0a939469196f8afb5188f4f1f39ba3cc4f712179fd1f7b1d42e821d9b64cdf4769425775dab2cf78

  • SSDEEP

    384:56Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eM:IfaC6mNhFz1Yyd4ErM+rMRa8NusJt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

ground-heavily.gl.at.ply.gg:17515

Mutex

d5dc10fa943690b23752f35ee47117e3

Attributes
  • reg_key

    d5dc10fa943690b23752f35ee47117e3

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Serverd.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections