General

  • Target

    rt.exe

  • Size

    37KB

  • MD5

    71f33744ecc3c8081c3aace847093b11

  • SHA1

    195bffaacc78ae7413ff8e171d9b2787d4642cc0

  • SHA256

    bdfb9bc4ada7e0f8ad5a38dd25427358c07faf7e2b1eb5094ffd5d6c678c3b9e

  • SHA512

    d9cd1c8c6c91d6bc37af0589aaaee85708d23bb47386968b97cd4fdf526fde4441404b9c2d28f271589f140f2db2ecf1dbe98a0f374abdff2d727060ffc7c6ad

  • SSDEEP

    384:eIoMiLzBndznNCyMGm36ePb9cGcPdhrAF+rMRTyN/0L+EcoinblneHQM3epzXNNY:FiRNRMGm33JVc1hrM+rMRa8Nubqt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

acer.tail843d69.ts.net:8080

Mutex

acda0b86727107ee4a9c230d7ddde1ae

Attributes
  • reg_key

    acda0b86727107ee4a9c230d7ddde1ae

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • rt.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections