General

  • Target

    Server1.exe

  • Size

    37KB

  • MD5

    ee0d1c2878ace4ef0022d2f09abe9ccc

  • SHA1

    8096d9c801aebad2e58c48698cfc84c73639120f

  • SHA256

    a4c6a71f2fef67eec9b45057a8f32e7ef367aa19a86611c0c639716c18d9d1c3

  • SHA512

    6e5e3db707b1e59390a21b1b84736166401d7da1e30f8531cded5b23c8c602966ec5816dd20c85eb10bdf82ffb7c3742f3223917dc547947cee68c353fe26014

  • SSDEEP

    384:Xunq1rCiMH3jBVbJsy8P5MbAoxv/vvQ6kxOrAF+rMRTyN/0L+EcoinblneHQM3eX:+n9bJP8P5AAiH1kErM+rMRa8Nuoct

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

until-delivering.gl.at.ply.gg:47346

Mutex

aa79b00d0228f4911d1b8f29eeadae45

Attributes
  • reg_key

    aa79b00d0228f4911d1b8f29eeadae45

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections