General
-
Target
828-74-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
Sample
221101-t4391aedaj
-
MD5
d4a88047bb33b1102690a491a29606b8
-
SHA1
c642e37fe1fc86966dd93ede0c679911f24fd595
-
SHA256
1099368a08ffe3672499c5c1dc5c732be5dd8f4d58f2b2a52f9283e237613712
-
SHA512
230dd657d026ff6391c670c505d79371e2faf138ffb1072bcf7680e0111069a1fccde15484998a71a80b17398a0428b3389b09e344ecbeb9a0f0ad2dd72f4560
-
SSDEEP
384:qLGCnWzGgqhZArwvaGGuPh5BrMtAQk93vmhm7UMKmIEecKdbXTzm9bVhcaP6Yr6s:0xvMAitA/vMHTi9bD
Behavioral task
behavioral1
Sample
828-74-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
828-74-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
v2.0
update
money2022.ddns.net:8080
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
828-74-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
d4a88047bb33b1102690a491a29606b8
-
SHA1
c642e37fe1fc86966dd93ede0c679911f24fd595
-
SHA256
1099368a08ffe3672499c5c1dc5c732be5dd8f4d58f2b2a52f9283e237613712
-
SHA512
230dd657d026ff6391c670c505d79371e2faf138ffb1072bcf7680e0111069a1fccde15484998a71a80b17398a0428b3389b09e344ecbeb9a0f0ad2dd72f4560
-
SSDEEP
384:qLGCnWzGgqhZArwvaGGuPh5BrMtAQk93vmhm7UMKmIEecKdbXTzm9bVhcaP6Yr6s:0xvMAitA/vMHTi9bD
Score1/10 -