General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    96ce0bd41a130c362b1166c770960287

  • SHA1

    01bfe9caf709cb3ab3366fd7cd28a5dd95ea4b30

  • SHA256

    4fd30f330a4150ba28848121c9c0e99c98b198b6abeeceba5c08024c0ab9a851

  • SHA512

    933e6af32e68822eef6bfd941a7f027eb8aeceb745b0fb091a79aa8e327ca955e8af20e4032debbee43233b03287321abab3ca95ffc2da127ac299fada9c78c1

  • SSDEEP

    1536:ZajFQWqkqqoLc2mLiIjEwzGi1dDyDMgS:ZajmkqqoA28i5i1dkl

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

193.123.88.61:4444

Mutex

9026faf0d7bc26a38f2e53c5ac0d583b

Attributes
  • reg_key

    9026faf0d7bc26a38f2e53c5ac0d583b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections