General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    2ef7aed002ffeb3bb11459e44c8985b4

  • SHA1

    3e4962d44fe8f156883af03bf3deeac2843c73f6

  • SHA256

    3f8718b194105edc9f367fa1a4155c48fa20526c08acce53ae8456a42355d45b

  • SHA512

    bd100c451a343966dd68550b4aee49271a2452dee399570b7397e7deb17694839bcfe5812d5aa11498337dc1ce4e8fb43d89a95417d424a04f913c30207d45d0

  • SSDEEP

    384:tqETgiG1CPZfursvO6yszi7oPJoTnuTarAF+rMRTyN/0L+EcoinblneHQM3epzX0:sE/5Wpszi7o2TuWrM+rMRa8Nux4t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

147.185.221.20:7771

Mutex

19f90553c0dfe2ce6a1dc4098a6125bc

Attributes
  • reg_key

    19f90553c0dfe2ce6a1dc4098a6125bc

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections