General

  • Target

    3760-135-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • Sample

    220811-rz96msgddj

  • MD5

    0bf7f36adb28e56d7fd8002734073cb5

  • SHA1

    8703e8f56abb7868afee5a2682e54cd50baf2c8a

  • SHA256

    8ec6fccdaa773885f0b9edcee9611e1245995b5195d839c6fc91d4f8a43d37e9

  • SHA512

    90aced0a644bb4d4ffdf123520c4a0e05a1ce2336b5145c84bda4b1d9a654797373e167cab97e66dc2aa81c38651c54ef3d17a57ff4c370a4249883be50e10ae

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

wibnj.duckdns.org:57831

Mutex

549d524552

Attributes
  • reg_key

    549d524552

  • splitter

    @!#&^%$

Targets

    • Target

      3760-135-0x0000000000400000-0x000000000040C000-memory.dmp

    • Size

      48KB

    • MD5

      0bf7f36adb28e56d7fd8002734073cb5

    • SHA1

      8703e8f56abb7868afee5a2682e54cd50baf2c8a

    • SHA256

      8ec6fccdaa773885f0b9edcee9611e1245995b5195d839c6fc91d4f8a43d37e9

    • SHA512

      90aced0a644bb4d4ffdf123520c4a0e05a1ce2336b5145c84bda4b1d9a654797373e167cab97e66dc2aa81c38651c54ef3d17a57ff4c370a4249883be50e10ae

    Score
    1/10

MITRE ATT&CK Matrix

Tasks