General

  • Target

    800-57-0x0000000000680000-0x000000000068C000-memory.dmp

  • Size

    48KB

  • Sample

    220714-s7nhaahdap

  • MD5

    f67233e27ba339b7482aa3445ff5bab6

  • SHA1

    5f766546f86e4933c9f536e2b57ae88421e334b5

  • SHA256

    f89449530f7d74d794cd89f0c24bfbf54361d44ff3f17f35e655d91aa71094ea

  • SHA512

    8cec30e5a64801363af5bd2da107927dd7241f1be9d5a801d7913ad257a00b1a0a15d70ab79a9f196a238826bdd2300532742ca50ca07ae00e36c8f62958d6f4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

milla.publicvm.com:5050

Mutex

dfb8baf1492a47f

Attributes
  • reg_key

    dfb8baf1492a47f

  • splitter

    @!#&^%$

Targets

    • Target

      800-57-0x0000000000680000-0x000000000068C000-memory.dmp

    • Size

      48KB

    • MD5

      f67233e27ba339b7482aa3445ff5bab6

    • SHA1

      5f766546f86e4933c9f536e2b57ae88421e334b5

    • SHA256

      f89449530f7d74d794cd89f0c24bfbf54361d44ff3f17f35e655d91aa71094ea

    • SHA512

      8cec30e5a64801363af5bd2da107927dd7241f1be9d5a801d7913ad257a00b1a0a15d70ab79a9f196a238826bdd2300532742ca50ca07ae00e36c8f62958d6f4

    Score
    10/10
    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

MITRE ATT&CK Matrix

Tasks