General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    84cc7227d21f9c65cae6e4451f18483d

  • SHA1

    504dff55fb25343ec964f740ecaba9d7d490fde3

  • SHA256

    4a41991bfc4cdd9dcec82592963bb61f62eb3075a53273bb018dc650eec49350

  • SHA512

    db834a4009a979c17f6759597fe0f86bcccb4c726c7f7c2518d57de1ca6ee95199e6dd2a96737cb93c64b3304ae5f39318b7d0349a9c74b6606934f22adfec65

  • SSDEEP

    768:uY32ub30YTXspgM0m2zGjpyDtdXWuhtXfLWhyXxrjEtCdnl2pi1Rz4Rk3ysGdpW3:YuT0AA0mT1mrWGL5jEwzGi1dDuDWgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:1488

Mutex

194d07662fe5562b24844f1d19460971

Attributes
  • reg_key

    194d07662fe5562b24844f1d19460971

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections