General

  • Target

    Server.exe

  • Size

    287KB

  • MD5

    ea17b12f90b9d9f940454651bb23ddb2

  • SHA1

    1f06fc12afcf267d8663bf92e00a09c46b68c849

  • SHA256

    c178a4227f0869c0ec5b0cc1d1ebff42a82a4b3f23e71c2fdccf5673d1f5e287

  • SHA512

    62086639d824584da2c269bc31932efe8660732dcd15f071436e794fb8687e2b89c1551d6439dcb0e5f02213bdbdbf078c4b220b39ac64c79e9c98dbf3f632a9

  • SSDEEP

    3072:Acwb092QAsSdADRq6ty71wtYM77ldY7AXTp2kA:ZuwH77Ppj0kA

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:8888

Mutex

a3bfe23a1eca722fceb292fb6eee1294

Attributes
  • reg_key

    a3bfe23a1eca722fceb292fb6eee1294

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections