General

  • Target

    336-60-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    7aa4c18fd7a6b154d3ccfe23536c4483

  • SHA1

    33a115d67d1d1dc2b3d563a4da2b7006ad45c344

  • SHA256

    5de2bbaf536c85921962050e2829b9da6daf13f805768a665e117f70aad31549

  • SHA512

    9b31214813f4a0145938edc4cf0586286844bc2180e3ec9f68696cc2d00a2d3c4d1ec24f86f5a781bc507cc6244516ea82616f51ac3dcf2f3199f734339310f2

  • SSDEEP

    384:V0NJLSXLSNB/aCxbWEFdc0//34LAZSTDHn:V0NY7EvdHqtn

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

PikoPiko

C2

pikopiko.ddns.net:2512

Mutex

165d6ed988ac

Attributes
  • reg_key

    165d6ed988ac

  • splitter

    sikora

Signatures

Files

  • 336-60-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections