General

  • Target

    1728-63-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    ec0a81a20e74405ca079c906e1980de5

  • SHA1

    5c85fb09a2a68dbeb413610a8230a943ee1790f1

  • SHA256

    d31c9ee516c0ae4cdfdce51ad07f222ddf216da394473e3ae3522615169ebc7c

  • SHA512

    d367bc4bb01ff8cd4c4cc0cc772cdc045677e564264bb9c08b180e6f2398675fa00e1a21a1214c08706b5dca2ae04607234ee851a641e708df56ed1c611b13f0

  • SSDEEP

    384:VQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZRO:65yBVd7Rpcnu/

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

punk12

C2

percolysrl2.ddns.net:4030

Mutex

0b2b2ed56af8e25b9b2f04f6fa1f47cf

Attributes
  • reg_key

    0b2b2ed56af8e25b9b2f04f6fa1f47cf

  • splitter

    |'|'|

Signatures

Files

  • 1728-63-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections