General
-
Target
800-57-0x0000000000680000-0x000000000068C000-memory.dmp
-
Size
48KB
-
Sample
220714-s7nhaahdap
-
MD5
f67233e27ba339b7482aa3445ff5bab6
-
SHA1
5f766546f86e4933c9f536e2b57ae88421e334b5
-
SHA256
f89449530f7d74d794cd89f0c24bfbf54361d44ff3f17f35e655d91aa71094ea
-
SHA512
8cec30e5a64801363af5bd2da107927dd7241f1be9d5a801d7913ad257a00b1a0a15d70ab79a9f196a238826bdd2300532742ca50ca07ae00e36c8f62958d6f4
Behavioral task
behavioral1
Sample
800-57-0x0000000000680000-0x000000000068C000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
800-57-0x0000000000680000-0x000000000068C000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
milla.publicvm.com:5050
dfb8baf1492a47f
-
reg_key
dfb8baf1492a47f
-
splitter
@!#&^%$
Targets
-
-
Target
800-57-0x0000000000680000-0x000000000068C000-memory.dmp
-
Size
48KB
-
MD5
f67233e27ba339b7482aa3445ff5bab6
-
SHA1
5f766546f86e4933c9f536e2b57ae88421e334b5
-
SHA256
f89449530f7d74d794cd89f0c24bfbf54361d44ff3f17f35e655d91aa71094ea
-
SHA512
8cec30e5a64801363af5bd2da107927dd7241f1be9d5a801d7913ad257a00b1a0a15d70ab79a9f196a238826bdd2300532742ca50ca07ae00e36c8f62958d6f4
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-