General

  • Target

    1352-148-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    bba4b89d9b1cf7fc0e265f6efdce8853

  • SHA1

    e1de92c2c50a53680daa19c7efc80752a970b299

  • SHA256

    64f6ead2a5761f317388eb1ff1aae0a83d9cd4e94924626cf97fe017b0b7f680

  • SHA512

    0a6ca04d2f8f3cd1535df91357d8b00c96eb44a91247d7d7156528b32f70f1af5250494216a44f6cc3e990244c735378c29d009011fdde572ad27c2408487d4e

  • SSDEEP

    384:G0bUe5XB4e0XmO344Ge4WT2tTUFQqz9dObbYy:HT9Bu1rDKnbT

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

4Mekey.myftp.biz:1011

Mutex

7b646cd2fe5

Attributes
  • reg_key

    7b646cd2fe5

  • splitter

    @!#&^%$

Signatures

Files

  • 1352-148-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections