General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    b91a5c7f8f93275cc9c9f6ae6718fef8

  • SHA1

    71f1a9b3121dfa908a65c65e7ffe32e96ce525be

  • SHA256

    1498ad3416f80ca9236279eca1c4ee2bce4373706b4f513ff80da22972fd4143

  • SHA512

    88c3e586afbf2136eccaed6a9056d52d3ceddea8631d9e71df3caeb1372d9c03beaaa2c103fb2c8c5c0ab1a7279ad3ae69b1054881d15d3a490699207f31b28a

  • SSDEEP

    384:g5waCiMGB63fbw6ZfrZUy8fiCH1OgmBeRcrAF+rMRTyN/0L+EcoinblneHQM3ep2:1a0DwODZX8fiCEdeWrM+rMRa8NuRWt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:19688:9999

Mutex

4b6ded2c8a70c1b087e0b5124eef254e

Attributes
  • reg_key

    4b6ded2c8a70c1b087e0b5124eef254e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections