General
-
Target
1756-56-0x00000000003C0000-0x00000000003CC000-memory.dmp
-
Size
48KB
-
Sample
220805-jhedmsgfh8
-
MD5
b615608b9551fc61b030d8c883e212f7
-
SHA1
c64931ce48de00776d6e64478b819ea6ed00f71a
-
SHA256
0c4e163dd233287bbc28101db0eb603cf06cf5eeb1fb4baeff8fe805b43cba62
-
SHA512
ae2c9a10353db03cd086fa952d6dc684064b0327f48711dd536f08a02308ad8ccf473df1a702d5a2ae5f5003fe28fb66c1ae10782ee3c65eeadaf1a23f92016a
Behavioral task
behavioral1
Sample
1756-56-0x00000000003C0000-0x00000000003CC000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
1756-56-0x00000000003C0000-0x00000000003CC000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
milla11.publicvm.com:5050
d84c416188f84fa099
-
reg_key
d84c416188f84fa099
-
splitter
@!#&^%$
Targets
-
-
Target
1756-56-0x00000000003C0000-0x00000000003CC000-memory.dmp
-
Size
48KB
-
MD5
b615608b9551fc61b030d8c883e212f7
-
SHA1
c64931ce48de00776d6e64478b819ea6ed00f71a
-
SHA256
0c4e163dd233287bbc28101db0eb603cf06cf5eeb1fb4baeff8fe805b43cba62
-
SHA512
ae2c9a10353db03cd086fa952d6dc684064b0327f48711dd536f08a02308ad8ccf473df1a702d5a2ae5f5003fe28fb66c1ae10782ee3c65eeadaf1a23f92016a
Score1/10 -