General

  • Target

    892-59-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • Sample

    220914-k4rfrsdedj

  • MD5

    da809ce5cc890f8a621c5fba8e9f3dcb

  • SHA1

    33cb3e0e68aa77abc18e63e83ef4077f5327916b

  • SHA256

    3457d59f354e8480686086cd700ffd65d6fc3bacf34ada64615fd2cd935b4878

  • SHA512

    1c191121c9b7bd274416540f216576bdf896eed63ff9045da97892cdc9ea5fb050bacc1cedaf775ed53cded49ab034b7044d309d48d4562ae60b775d1f3a0102

  • SSDEEP

    384:VZyATsVqb08yP8pba1a+MMI9WcJ+9D9O5UE5QzwBlpJNakkjh/TzF7pWnOvgreTD:/5Ts8Y5P8R2Jo9XvQO+Xd+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

topher

C2

6.tcp.ngrok.io:10813

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      892-59-0x0000000000400000-0x0000000000412000-memory.dmp

    • Size

      72KB

    • MD5

      da809ce5cc890f8a621c5fba8e9f3dcb

    • SHA1

      33cb3e0e68aa77abc18e63e83ef4077f5327916b

    • SHA256

      3457d59f354e8480686086cd700ffd65d6fc3bacf34ada64615fd2cd935b4878

    • SHA512

      1c191121c9b7bd274416540f216576bdf896eed63ff9045da97892cdc9ea5fb050bacc1cedaf775ed53cded49ab034b7044d309d48d4562ae60b775d1f3a0102

    • SSDEEP

      384:VZyATsVqb08yP8pba1a+MMI9WcJ+9D9O5UE5QzwBlpJNakkjh/TzF7pWnOvgreTD:/5Ts8Y5P8R2Jo9XvQO+Xd+L

    Score
    1/10

MITRE ATT&CK Matrix

Tasks