General

  • Target

    mt.exe

  • Size

    13.0MB

  • MD5

    668a70cc289c63f6bf592b4cfb013d22

  • SHA1

    a6f6c080c9f1abba255c5ec37f9b130e9d7f9595

  • SHA256

    a32b3ca3e29a81c101a34ddb508655964ad313be3b7cc60a2171e6e2d4401ab8

  • SHA512

    51f611b9f77fbbe6410c69c3ff2ff8f5219d97c3aefecc8748ef772ddef322af7a290401f65221f987c49939e274d14e7778a2a062f9c68d3acf9f5b191a1b06

  • SSDEEP

    1536:Y8NBNvGfr2p4dTT/hDjEwzGi1dDlD+gS:Y8Yfr2p4dP/Gi1dZj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

4.tcp.eu.ngrok.io:15003

Mutex

01f6bac071ba37cfd566052c982ebaab

Attributes
  • reg_key

    01f6bac071ba37cfd566052c982ebaab

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • mt.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections