General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    69a63826396394dda992a5031f523b11

  • SHA1

    6ca89b77eaa65d9c970d0071dc2677f852517fc5

  • SHA256

    be045197a762a6d773cd7ddbe97b3a2e5ddac683c271c080fe75cdf03d87b98a

  • SHA512

    aaba1ee3c874a2bd0ca8da8dd5ffa44f57209ac6ed97b44f7ca689b2dbcc45af62256a12edb360e18ea0165c386dff1f7dabf7ffd43b6d3fd6ed2d4eb67c4f1c

  • SSDEEP

    384:EWqBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3epd:x35M5jUvairANsIQxrM+rMRa8NuiGt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

26.ip.gl.ply.gg:55609

Mutex

e70d52b52cebf51e595b7b1265a8cbe7

Attributes
  • reg_key

    e70d52b52cebf51e595b7b1265a8cbe7

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections