General

  • Target

    1256-57-0x0000000000D60000-0x0000000000D6C000-memory.dmp

  • Size

    48KB

  • MD5

    19c26076fd5654b10259af32c5a7decc

  • SHA1

    4a8626dc77befc937f1acea812bd7e52a1bf6b72

  • SHA256

    b9fe4c246dade6fc39d0b74267075548472a9ccd48c7cd2996e3ae88787b1d61

  • SHA512

    dee4a539f658a5117d82136b786e1311ef7009825b46222cfe11ff5c4f0be65ef50d8978d0f6ccad738edf1fda09c74ea478e36342a91bece89de7f295fb3c9c

  • SSDEEP

    384:o0bUe5XB4e0XmObEc6WQzHWT8tTUFQqz9MObbe:dT9Bu1wcrQVabe

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

seznam.zapto.org:5050

Mutex

1e21c2fe0de74

Attributes
  • reg_key

    1e21c2fe0de74

  • splitter

    @!#&^%$

Signatures

Files

  • 1256-57-0x0000000000D60000-0x0000000000D6C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections