General
-
Target
3760-135-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
Sample
220811-rz96msgddj
-
MD5
0bf7f36adb28e56d7fd8002734073cb5
-
SHA1
8703e8f56abb7868afee5a2682e54cd50baf2c8a
-
SHA256
8ec6fccdaa773885f0b9edcee9611e1245995b5195d839c6fc91d4f8a43d37e9
-
SHA512
90aced0a644bb4d4ffdf123520c4a0e05a1ce2336b5145c84bda4b1d9a654797373e167cab97e66dc2aa81c38651c54ef3d17a57ff4c370a4249883be50e10ae
Behavioral task
behavioral1
Sample
3760-135-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
3760-135-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
wibnj.duckdns.org:57831
549d524552
-
reg_key
549d524552
-
splitter
@!#&^%$
Targets
-
-
Target
3760-135-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
0bf7f36adb28e56d7fd8002734073cb5
-
SHA1
8703e8f56abb7868afee5a2682e54cd50baf2c8a
-
SHA256
8ec6fccdaa773885f0b9edcee9611e1245995b5195d839c6fc91d4f8a43d37e9
-
SHA512
90aced0a644bb4d4ffdf123520c4a0e05a1ce2336b5145c84bda4b1d9a654797373e167cab97e66dc2aa81c38651c54ef3d17a57ff4c370a4249883be50e10ae
Score1/10 -