General
-
Target
1136-56-0x0000000000510000-0x000000000051C000-memory.dmp
-
Size
48KB
-
Sample
220731-svvqtshgdp
-
MD5
086618ae07e0f4b95484d3f1bf056c41
-
SHA1
2c99533e683ce45f65d0f9254fd928b97f7a12bd
-
SHA256
c401d78e14c7dbb0f49275cbb755c33181a0eb25e6a9d40fd60ce6fa6f28ce7f
-
SHA512
7240b64487c36cd4af2727f721b6cfdc66cdffcf75f5c372c92f02b3c6021bd7bc59c269811c1d9d49d52ac209645c30ffa3070d01f774855cbd6333e7707cbf
Behavioral task
behavioral1
Sample
1136-56-0x0000000000510000-0x000000000051C000-memory.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
1136-56-0x0000000000510000-0x000000000051C000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
milla.publicvm.com:5050
3bce5ce3d90c4219b54
-
reg_key
3bce5ce3d90c4219b54
-
splitter
@!#&^%$
Targets
-
-
Target
1136-56-0x0000000000510000-0x000000000051C000-memory.dmp
-
Size
48KB
-
MD5
086618ae07e0f4b95484d3f1bf056c41
-
SHA1
2c99533e683ce45f65d0f9254fd928b97f7a12bd
-
SHA256
c401d78e14c7dbb0f49275cbb755c33181a0eb25e6a9d40fd60ce6fa6f28ce7f
-
SHA512
7240b64487c36cd4af2727f721b6cfdc66cdffcf75f5c372c92f02b3c6021bd7bc59c269811c1d9d49d52ac209645c30ffa3070d01f774855cbd6333e7707cbf
Score1/10 -