General
-
Target
1992-55-0x0000000000340000-0x0000000000352000-memory.dmp
-
Size
72KB
-
Sample
220901-z76r7abdbr
-
MD5
1b8090f3b313a788d587e605d6e81280
-
SHA1
419d51474faa9b12b9061a47455d909ff9deb7cb
-
SHA256
db8a3ba6a714f4bf5d796edefd48f8af46c7ddb23593ad3fd803dcc786e7c1a7
-
SHA512
d37c0578487d7e1768b00f8fa80d25e1dff18efe43b71e0acae1dcec593bbad86ff36294982b27f7a5741a812b1b373b6fc10330439ffe2ac11da50d9aaeb4c8
-
SSDEEP
384:88ZySa33VarE8yTNJFqfQYMEnwpai0+dzEIij+ZsNO3PlpJKkkjh/TzF7pWn+mge:86xq3MY5TnFqfpMpLuXQ/orq+L
Behavioral task
behavioral1
Sample
1992-55-0x0000000000340000-0x0000000000352000-memory.exe
Resource
win7-20220812-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
0.tcp.eu.ngrok.io:13489
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
1992-55-0x0000000000340000-0x0000000000352000-memory.dmp
-
Size
72KB
-
MD5
1b8090f3b313a788d587e605d6e81280
-
SHA1
419d51474faa9b12b9061a47455d909ff9deb7cb
-
SHA256
db8a3ba6a714f4bf5d796edefd48f8af46c7ddb23593ad3fd803dcc786e7c1a7
-
SHA512
d37c0578487d7e1768b00f8fa80d25e1dff18efe43b71e0acae1dcec593bbad86ff36294982b27f7a5741a812b1b373b6fc10330439ffe2ac11da50d9aaeb4c8
-
SSDEEP
384:88ZySa33VarE8yTNJFqfQYMEnwpai0+dzEIij+ZsNO3PlpJKkkjh/TzF7pWn+mge:86xq3MY5TnFqfpMpLuXQ/orq+L
-