General
-
Target
1380-70-0x0000000000400000-0x0000000000978000-memory.dmp
-
Size
5.5MB
-
Sample
221208-m73z3shg68
-
MD5
44cbcc15ce0c9172d1609eb0dfa5aa70
-
SHA1
b2f8b7e8dea69f41aa74c5c2f78d6ea66065da66
-
SHA256
aac73bc3c9a5231a4b464563ea797a4731b99d3e2e72f9988296ba4a13b7e981
-
SHA512
605de638f079eaa7d9053ad746a9b1985eb6c27542ee5dd2b8730043bd53fd3d45ca62fae8e5a8ce56ad99aa606e1ce35106c4639339b8515a9fea46dee3b3ff
-
SSDEEP
768:8rhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti/dj:OcZ6eh6gQVkUj
Behavioral task
behavioral1
Sample
1380-70-0x0000000000400000-0x0000000000978000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1380-70-0x0000000000400000-0x0000000000978000-memory.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.7d
MyBot
alka.ddns.net:4444
610ba357edf3ec0f6e3dbbff929d8468
-
reg_key
610ba357edf3ec0f6e3dbbff929d8468
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
1380-70-0x0000000000400000-0x0000000000978000-memory.dmp
-
Size
5.5MB
-
MD5
44cbcc15ce0c9172d1609eb0dfa5aa70
-
SHA1
b2f8b7e8dea69f41aa74c5c2f78d6ea66065da66
-
SHA256
aac73bc3c9a5231a4b464563ea797a4731b99d3e2e72f9988296ba4a13b7e981
-
SHA512
605de638f079eaa7d9053ad746a9b1985eb6c27542ee5dd2b8730043bd53fd3d45ca62fae8e5a8ce56ad99aa606e1ce35106c4639339b8515a9fea46dee3b3ff
-
SSDEEP
768:8rhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti/dj:OcZ6eh6gQVkUj
Score1/10 -