General

  • Target

    1744-157-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    6c4a91e133ce97143c201d9e302c40cd

  • SHA1

    3c381f8285420be2b6273e3336e0d7d201f403e2

  • SHA256

    cb92c551fdc5aef72c7fc10ca596e17baeee77a2cb30de8902b0c87d1ea08722

  • SHA512

    a04632cbcb86c83eb5ecc58273522c9f8368447f648609f777fe120e2695ed291dc1cecf245a5909e617154dadd572badfcdbdc82c868c2a37f32e549cd0fe26

  • SSDEEP

    384:+0bUe5XB4e0XrODxggUBZIGFWT5tTUFQqzF1IObbT:vT9BuS9ggUBZIpAvbT

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

crazydns.linkpc.net:5900

Mutex

d9590f01b48c43

Attributes
  • reg_key

    d9590f01b48c43

  • splitter

    @!#&^%$

Signatures

Files

  • 1744-157-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections