General
-
Target
892-59-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
Sample
220914-k4rfrsdedj
-
MD5
da809ce5cc890f8a621c5fba8e9f3dcb
-
SHA1
33cb3e0e68aa77abc18e63e83ef4077f5327916b
-
SHA256
3457d59f354e8480686086cd700ffd65d6fc3bacf34ada64615fd2cd935b4878
-
SHA512
1c191121c9b7bd274416540f216576bdf896eed63ff9045da97892cdc9ea5fb050bacc1cedaf775ed53cded49ab034b7044d309d48d4562ae60b775d1f3a0102
-
SSDEEP
384:VZyATsVqb08yP8pba1a+MMI9WcJ+9D9O5UE5QzwBlpJNakkjh/TzF7pWnOvgreTD:/5Ts8Y5P8R2Jo9XvQO+Xd+L
Behavioral task
behavioral1
Sample
892-59-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
892-59-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
topher
6.tcp.ngrok.io:10813
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
892-59-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
da809ce5cc890f8a621c5fba8e9f3dcb
-
SHA1
33cb3e0e68aa77abc18e63e83ef4077f5327916b
-
SHA256
3457d59f354e8480686086cd700ffd65d6fc3bacf34ada64615fd2cd935b4878
-
SHA512
1c191121c9b7bd274416540f216576bdf896eed63ff9045da97892cdc9ea5fb050bacc1cedaf775ed53cded49ab034b7044d309d48d4562ae60b775d1f3a0102
-
SSDEEP
384:VZyATsVqb08yP8pba1a+MMI9WcJ+9D9O5UE5QzwBlpJNakkjh/TzF7pWnOvgreTD:/5Ts8Y5P8R2Jo9XvQO+Xd+L
Score1/10 -