General

  • Target

    b66f55f68f24a7b10582a0d5781a57b2afafddbb775c21846b722bdbc3d8fba2N

  • Size

    29KB

  • MD5

    56f0bfe2be04bee91c72ca4e2b37fa10

  • SHA1

    48f21909f78e038bf80c6efdbb9f9554f489abe6

  • SHA256

    b66f55f68f24a7b10582a0d5781a57b2afafddbb775c21846b722bdbc3d8fba2

  • SHA512

    1c5be58ba3af1ecf3cf5b19c0704361e30ec4e058057a5cf6ae27326ba5aa3cfecda4bbb7daae5a3e8e964526b601ad4072cd18cb277de2254c6edb94ea3f1f3

  • SSDEEP

    384:ros5l7l7EMrof6oyr/5NxrimmqDWD4IePUGBsbh0w4wlAokw9OhgOL1vYRGOZze7:T7GMroynbprsq04IePBKh0p29SgR4F

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

registry

C2

register.hopto.org:1177

Mutex

c1c860ff12fc4f76764afdc52f550013

Attributes
  • reg_key

    c1c860ff12fc4f76764afdc52f550013

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b66f55f68f24a7b10582a0d5781a57b2afafddbb775c21846b722bdbc3d8fba2N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections