General

  • Target

    536-55-0x0000000000350000-0x0000000000362000-memory.dmp

  • Size

    72KB

  • MD5

    a99a2106a862bc08ae4f945502a06975

  • SHA1

    45f7f99a6d2e39d0d9be2a0747fd55d789fe32ea

  • SHA256

    80a1c68970a2643c2fd8bd7acdba3ca5b6490d8b83db41b03aaf9b10152c94ce

  • SHA512

    6edb168246c976d80a74f98e69e9e546e8cbbef907db4fd102721d89bc02c674405d50d7a3f979b25374bff2dbf848a46a25e3b389200a521a657a9737e21f2b

  • SSDEEP

    384:gZygGFgpWoy7LvW+wKEhxignq3zoIij+ZsNO3PlpJKkkjh/TzF7pWnMgheT0pqfT:G+Wol7jW70gauXQ/o3+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

Hacked

C2

4.tcp.eu.ngrok.io:15025

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

Files

  • 536-55-0x0000000000350000-0x0000000000362000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections