General

  • Target

    1288-63-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    edea8feba241cc7a31f371c76386b26b

  • SHA1

    2c04e6b71f317ed91c9de07a97064a23dc5e4585

  • SHA256

    8c3ebe6c6dab9acc683155d4ce8682b12113dc5731dff836889945385f7f2890

  • SHA512

    fbfff822b67d22f840cb28932a25bf6a5a8c46f158f33ba150fab4dbc1eca9a47b9674b1070aba1fd1aeb340340fb3031b40fe7942d18e6bae3d0553a554bf84

  • SSDEEP

    384:K0bUe5XB4e0XjODzw0Q0mS03CWTDtTUFQqzFhObb:TT9Bu6Y55xPb

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

fur1a.duckdns.org:1995

Mutex

bc44c55f6c2c4b43

Attributes
  • reg_key

    bc44c55f6c2c4b43

  • splitter

    @!#&^%$

Signatures

Files

  • 1288-63-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections