General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    952ea2d47e241b1a82eeb265457c5644

  • SHA1

    16048d925d1722c3a97bbbd0ab0dc05f169c1af7

  • SHA256

    c7a2ec6110cfa5ae4b53b2b854013459bcdba8fff179bf95e5b707a2e4b98427

  • SHA512

    9001eaa366acab6c0574912215d18d73ee944482a469243a0e40dc340a6523b4ce58ea0ed18f232eac8813477f5918c649353da0abd32c57fc3735721be407ad

  • SSDEEP

    384:Io66MizdTjnBhFbJ8ycP3h3hNwKaB0rAF+rMRTyN/0L+EcoinblneHQM3epzXaNg:36QTlLJfcP3hH9amrM+rMRa8NuQWt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

cnet-contracting.gl.at.ply.gg:10206

Mutex

3eec6dad022c4e8fee29e905fa2de108

Attributes
  • reg_key

    3eec6dad022c4e8fee29e905fa2de108

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections