General

  • Target

    2020-63-0x0000000000400000-0x000000000040E000-memory.dmp

  • Size

    56KB

  • MD5

    c9a71a4865c28f08fe330fc53ae454c5

  • SHA1

    ed009e146e3ca01a6fc53588982c77e734b7ef7b

  • SHA256

    6722df72f6b74ac3ea16a2dd049a2ecb027717d770a4aec6dfddba3126bfd5d8

  • SHA512

    94e1a4b246fb2e60f4ed707a9288f72ca253fa3ecd6a0758a8eaf2d8d6bf96fee143dd5db23e750a043242e65050db3d467b5f2abcd3c4ba34758ee21c05534f

  • SSDEEP

    384:rLo5CVFzG+7OA0VsMEvFO4xQi+APqhV3MzAQk93vmhm7UMKmIEecKdbXTzm9bVhM:/wfILxrzA/vMHTi9bDD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

HacKed

C2

37.0.14.215:4676

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

Files

  • 2020-63-0x0000000000400000-0x000000000040E000-memory.dmp
    .exe windows x86


    Headers

    Sections