General

  • Target

    2040-62-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    01308ba5ee84577f00401a343b346f08

  • SHA1

    a0e853e535ac2fe7cacd30cd370d088385906e50

  • SHA256

    0d3c8e57b2ca0439345b34be4d02b47785bbaecf0a2dd1ca43f6033faff8536c

  • SHA512

    271a4ab0335d1dbf62a7eeabde58ff4512b46ee0dfde87c306c416ee4e62a30034dc7c0bdda6dd6463a96955663ec7436322584d60b7a784fe2bd123e377855d

  • SSDEEP

    768:Q8DyFut1MankI2N9himQR3Q0kSNAmwFvfu0YMDHPsMI7XJSxI3pmdm:Q8y8Dn2N9himKdDVwsNMDOXExI3pmdm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

9d5ce28ee0015092fdcbbede58e23910

Attributes
  • reg_key

    9d5ce28ee0015092fdcbbede58e23910

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • 2040-62-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections