General

  • Target

    1836-55-0x00000000003C0000-0x00000000003D2000-memory.dmp

  • Size

    72KB

  • MD5

    34c8585f3489be745e509e06b311c855

  • SHA1

    abc0dad9b4265c09a879b8770a380c075d69931d

  • SHA256

    8e4232565602a9a9e2c339a289508dfc54acab3b87ef736a54d0b5f4611bac4e

  • SHA512

    479be6c055b1b00b4b4d7a4e3bcdf988b0f1816241fa2486cddc2a1c03a644c478b517a5f5c0d5bfba777cb1a86231a324fe742abe2a2a7a25c9581ce442b967

  • SSDEEP

    384:TZyYL2adsbhKIyK55JoWgEmbr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnv1greT0pqH:dxNiwFKTJH2UuXQ/o61+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:13225

Mutex

WindowsEnginee

Attributes
  • reg_key

    WindowsEnginee

  • splitter

    |Hassan|

Signatures

Files

  • 1836-55-0x00000000003C0000-0x00000000003D2000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections