General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    af3987fa1d2f6bd3534c1e9159e75ee5

  • SHA1

    1e4630ba996567ed16226a10fecaffaa14ab9519

  • SHA256

    57bcf27847de89d157295113eda30a0a844e41cb93d058e03e45c66dd759b091

  • SHA512

    f95657b16e0b8e23643375b4fc8b52cdae19e3994a895830b900de9cfbb41247f07cff91793320793c2bb0152317870936b45005ed38ac075c1998bc962aac81

  • SSDEEP

    384:FeL8CT0i9NdTe/kCOyU7NuvLmDPM+7rAF+rMRTyN/0L+EcoinblneHQM3epzXcN+:ELhT1CFU7NuKbMgrM+rMRa8NuOAt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

211.178.25.134:1493

Mutex

dd26d5a13ce8b755443113d781bff4f7

Attributes
  • reg_key

    dd26d5a13ce8b755443113d781bff4f7

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.