General

  • Target

    BootstrapperV1.32.exe

  • Size

    55KB

  • MD5

    a789f36018dc8f90b31f5a4bada5f06e

  • SHA1

    9055844946a5d8f0e28f2c4166e4a7ee37b78abd

  • SHA256

    81193651af092ef7f9382122950f1fc62366019f3ee30cd3c8b1e547859d767e

  • SHA512

    853ae72e8f3fdb103c98e6b8cb1e8b96ece313491ab7f2db386238e2f88c690ce2848c57c212fa7bd1c65a52ca5bcee8c89d33c6608211e50c2afdb6dc79ad8d

  • SSDEEP

    1536:yxYADn8fLN2/SbxRDD3wsNMDbXExI3pm6m:VADnccqbTDD3wsNMDbXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

veletroblox

C2

tm6bqni.localto.net:5846

Mutex

d54b8b335e1de961884f3956c1c39c50

Attributes
  • reg_key

    d54b8b335e1de961884f3956c1c39c50

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BootstrapperV1.32.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections