General

  • Target

    1380-70-0x0000000000400000-0x0000000000978000-memory.dmp

  • Size

    5.5MB

  • Sample

    221208-m73z3shg68

  • MD5

    44cbcc15ce0c9172d1609eb0dfa5aa70

  • SHA1

    b2f8b7e8dea69f41aa74c5c2f78d6ea66065da66

  • SHA256

    aac73bc3c9a5231a4b464563ea797a4731b99d3e2e72f9988296ba4a13b7e981

  • SHA512

    605de638f079eaa7d9053ad746a9b1985eb6c27542ee5dd2b8730043bd53fd3d45ca62fae8e5a8ce56ad99aa606e1ce35106c4639339b8515a9fea46dee3b3ff

  • SSDEEP

    768:8rhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti/dj:OcZ6eh6gQVkUj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

alka.ddns.net:4444

Mutex

610ba357edf3ec0f6e3dbbff929d8468

Attributes
  • reg_key

    610ba357edf3ec0f6e3dbbff929d8468

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      1380-70-0x0000000000400000-0x0000000000978000-memory.dmp

    • Size

      5.5MB

    • MD5

      44cbcc15ce0c9172d1609eb0dfa5aa70

    • SHA1

      b2f8b7e8dea69f41aa74c5c2f78d6ea66065da66

    • SHA256

      aac73bc3c9a5231a4b464563ea797a4731b99d3e2e72f9988296ba4a13b7e981

    • SHA512

      605de638f079eaa7d9053ad746a9b1985eb6c27542ee5dd2b8730043bd53fd3d45ca62fae8e5a8ce56ad99aa606e1ce35106c4639339b8515a9fea46dee3b3ff

    • SSDEEP

      768:8rhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti/dj:OcZ6eh6gQVkUj

    Score
    1/10

MITRE ATT&CK Matrix

Tasks