General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    25443271763910e38d74296d29f48071

  • SHA1

    269a7dd9ff1d0076a65630715f5bd4600a33bb0d

  • SHA256

    3bf2449588aaea6f7b7f984af24bd889ee438bb33d9331f5990ef9b6184695e8

  • SHA512

    185d233076e4727bf1471f579e2fb56725e30a1f1d4b1f70c8da03d389f41d879eba3731f6daedb34edb8c073df90ca3c0df19362f7b174c72bd6a1251d67aea

  • SSDEEP

    768:IY3zetD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3QsG7:jenOx6baIa9RPj00ljEwzGi1dDoDvgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

6.tcp.eu.ngrok.io:15905

Mutex

d8c4f4669aaf7e763f29c3228e3c660d

Attributes
  • reg_key

    d8c4f4669aaf7e763f29c3228e3c660d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections