General

  • Target

    1472-56-0x0000000000250000-0x000000000025C000-memory.dmp

  • Size

    48KB

  • MD5

    eab74f1d824920aae856d3d2be7fb3ff

  • SHA1

    8ede1398281c8cc10fcaa74948672cd306708c05

  • SHA256

    0b7224dd4058c84a060c06a131d705d645f80cdda82a57b2b0605cae056a47ac

  • SHA512

    38f807709ee07caae4caeccaee5bdea518bf71aa8237161bd01ff15acdf1cc05ab4b856ff5271d718225ab8e0292a6df90c484326efb590f7dbc1403f93f2561

  • SSDEEP

    384:629qHfDJBecNTlK9ShQh9XEAys7dG3ELZoyzMdOJ/xJPz2jmzUM9l/Us0nMs:tq//TA9SUr19o8JDPUgjc

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ebay.thedreamsop.com:1010

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

Files

  • 1472-56-0x0000000000250000-0x000000000025C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections