General

  • Target

    1320-142-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    c47df7fcea58ef8528e9a90c9028c600

  • SHA1

    a9cec18b9d5b71ebcae93a695039d9cccb088889

  • SHA256

    d8288df2aa8492ce9d342b81e75c33b2db080b6efa0ced90c2a4d28a0e9a3efe

  • SHA512

    9bd9204ea1735172b50441495c040c74858ed99b70d349809038a9f4c428f0bcc53b7d9ab53a8d56cf47f3f66dde6c7b7b780ee59bee0c237e64b255bec1b513

  • SSDEEP

    384:n0bUe5XB4e0X7OxZgFS6Z/73AWTPtTUFQqz9kObb7:sT9BuCYS6BZub7

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

wins10ok.duckdns.org:8000

Mutex

3b71ea03e4

Attributes
  • reg_key

    3b71ea03e4

  • splitter

    @!#&^%$

Signatures

Files

  • 1320-142-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections