General

  • Target

    856-60-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    b69a4478bd466e31959dfa878f79286d

  • SHA1

    918062d41b16412e166f566d0036c27c85043222

  • SHA256

    356c52be83d711055a92d996b9895864c1eeb5bd8dc1c7a37fe0f4032090dd57

  • SHA512

    a8a23e659a3987e7570c132cd684e485d2c35108136ca08651fbffb54b200a7ce2684d1899d61b51c4631712037138ea37b3aa5537513deb49a830e8db36176d

  • SSDEEP

    384:U0bUe5XB4e0XfOVFggUBZIGWWTWtTUFQqzFJ9Obb:xT9Bu2DggUBZIzkSb

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

capurgana.duckdns.org:2054

Mutex

d05dc46f6b3

Attributes
  • reg_key

    d05dc46f6b3

  • splitter

    @!#&^%$

Signatures

Files

  • 856-60-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows x86


    Headers

    Sections