Resubmissions

01-12-2024 17:18

241201-vvcala1nhl 10

02-03-2024 19:50

240302-ykm6wshc64 10

General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    b3d12b297a856103adb57f5492cd6851

  • SHA1

    2a6ebc4e929ed73ecc3720ae01d3d16e8f7b6089

  • SHA256

    83b66e30244b1729ebbaf9f0921fd51c0337e638665fa1ab01e8d8237a7fe80c

  • SHA512

    54d38f293feb0cb43dbcd9c8ac3b787e087ce471ced0a0ce7aa72a24d43acdf4d5210633832a68def43fd5c6561069353fdb6eb29ced28cbebbf27c302481cb8

  • SSDEEP

    384:b1tcaCisx/WRdL5kyc/Tant5ngCmxorAF+rMRTyN/0L+EcoinblneHQM3epzXCNV:RtcmD5nc/TaPNmyrM+rMRa8Nucpt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

4elsnurikom

C2

6.tcp.eu.ngrok.io:12125

Mutex

c52f1e45400f62b1c170da017d840dd6

Attributes
  • reg_key

    c52f1e45400f62b1c170da017d840dd6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections