General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    b639b796e755ba9a04a6a5f2900fc084

  • SHA1

    e1f8a378c4b2c46c873ae77453399b1e9dc01b14

  • SHA256

    6d498dd502299432d28c52c34726738dac6f0466e12caf4240e09231a00b0d01

  • SHA512

    cc0e3c2fc6bbc0fc0c4b490d46090b7ab4bc3538784bcfbad46d93b064a938c6d80ea20628eae2afcae74410477af7522ab7b00807a6dc991b372b8cdd99be9f

  • SSDEEP

    1536:mU+8mGnrQr1EsOoYdsjEwzGi1dDmDFgS:mUvnrQr11r2i1doS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Runtim14531oker.exe

C2

hakim32.ddns.net:2000

morning-ultimately.gl.at.ply.gg::14531

Mutex

18f92744a712890ce1a5852179df81aa

Attributes
  • reg_key

    18f92744a712890ce1a5852179df81aa

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections