General
-
Target
1224-6009-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
Sample
221031-snhgxsbcd8
-
MD5
1d0e19b0f5bef53aaac9b213bf2e6cbc
-
SHA1
a33e207ce03d79469864ba33e41a8ff15959ddb1
-
SHA256
5094e60e2fa935f5737c2cf5f471c0f90662422f341725e6c22189c767828622
-
SHA512
e656b612cc9628f3166aed53c9d26c39a7141552f75f631f3cbf01475cead61ca25fe5ecff8630527f5a38bee291d1028beafa2c6e04b2694712b85f7e69e62b
-
SSDEEP
384:OLGCnWzGgqhZArwvaGGuPh5BrMtAQk93vmhm7UMKmIEecKdbXTzm9bVhcaP6Yr6s:YxvMAitA/vMHTi9bD
Behavioral task
behavioral1
Sample
1224-6009-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1224-6009-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
v2.0
update
money2022.ddns.net:8080
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
1224-6009-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
1d0e19b0f5bef53aaac9b213bf2e6cbc
-
SHA1
a33e207ce03d79469864ba33e41a8ff15959ddb1
-
SHA256
5094e60e2fa935f5737c2cf5f471c0f90662422f341725e6c22189c767828622
-
SHA512
e656b612cc9628f3166aed53c9d26c39a7141552f75f631f3cbf01475cead61ca25fe5ecff8630527f5a38bee291d1028beafa2c6e04b2694712b85f7e69e62b
-
SSDEEP
384:OLGCnWzGgqhZArwvaGGuPh5BrMtAQk93vmhm7UMKmIEecKdbXTzm9bVhcaP6Yr6s:YxvMAitA/vMHTi9bD
Score1/10 -