General

  • Target

    Server.exe

  • Size

    43KB

  • MD5

    1475055fabe6901885d70f3d66ac8ab8

  • SHA1

    8892467128916b6b40b9d35598067a05efb3532c

  • SHA256

    9befd1dd28ec8cc0d7b5255cc4debd5936192107542065108694a42334d9ab55

  • SHA512

    2240b400b01cbd5bac09ca88aa404ac9684148ae8a0fb1195f2b2c1234fb0465ebc3d72695fcfccdc1e3fed58551f2822d2d995763d11159355e734569215338

  • SSDEEP

    384:uTZyf9lkteXivmGUyeSRCymw5EBxE1UE+zwIij+ZsNO3PlpJKkkjh/TzF7pWnPml:udElkQyvdhe8Ce4E6uXQ/oSC+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

tcp://5.tcp.eu.ngrok.io:13134:7771

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.