General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    704ed08f02343f35ff669d8ec651d4c1

  • SHA1

    44b3f95cd69649435f129d9bcd0363a402d1534a

  • SHA256

    92daebf4afdf05aa2b7e92ec7d81c44803d255fc9bd6bbda8f9ed4af271b45da

  • SHA512

    022f1ffe197e038c46b2ce46e59106bd910d5eb85fc6a08d999dda14ed5be7eb1c168b7a0e4158ab23368d97c43fd1b44034e543c5c0e68b3ba6fbae860c2cb9

  • SSDEEP

    384:ZLm2KMizd9jnBhFbJ8ycPVnvvnwaUBTrAF+rMRTyN/0L+EcoinblneHQM3epzXF0:Q2g9lLJfcPVn3VU9rM+rMRa8Nu7ct

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

5.tcp.eu.ngrok.io:10587

Mutex

f1a130bd88e2893ab9bf8c985154ecb1

Attributes
  • reg_key

    f1a130bd88e2893ab9bf8c985154ecb1

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections