General

  • Target

    884-82-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    14caee56d589a5802862f56b23f01a3c

  • SHA1

    fcca643798af351607622517a5e690b229d054d3

  • SHA256

    3ac6b7fee07ca86243feffb4fd61dcdaacb3f803fa2033228f1c888f4d834d4f

  • SHA512

    a2d97073f067175a8cdae05e43a7c77fa755a98f9f091a5b01f015bb06ad2bef2a68a894f64622476d98cfb58ae451c9bc0e0ed8ae276d937d6e5db575409442

  • SSDEEP

    384:Twz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZKvS:YTbC81NgRpcnuLS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

blog.hackcrack.io:8082

Mutex

ffbae9048f2c6df454909a7272595410

Attributes
  • reg_key

    ffbae9048f2c6df454909a7272595410

  • splitter

    |'|'|

Signatures

Files

  • 884-82-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections