General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    082d66073df1eb34c9aa493509bcc679

  • SHA1

    7638128d3534994967b422a88efabde31dbc23d0

  • SHA256

    0e25f48d1ee6a86b3332c6708c5725d5047367acbda0aab146ef0a8031994a5a

  • SHA512

    e3bf2bdae5d20a756213d30fc84be5fe8a521acef245cd0a329c79032510e92f4ecf30c3fa2aaa6b7d20605f014c4a5e93020c13f21ca9cadb0a3b65ad895c32

  • SSDEEP

    1536:wUv+R5dOZgSNp9jzGjEwzGi1dD4DdDgS:wUgdOZgSNvzvi1dm2

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

232222222223-43449.portmap.host:43449

Mutex

1d18ac3435cdf9789cf49e5a3bf5b03f

Attributes
  • reg_key

    1d18ac3435cdf9789cf49e5a3bf5b03f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections