General

  • Target

    1728-55-0x00000000003C0000-0x00000000003CC000-memory.dmp

  • Size

    48KB

  • MD5

    9948b0078db02f20a849748bfe4d1d1c

  • SHA1

    b452876d8daef06dffe35a8767386ae575c0f0d6

  • SHA256

    4c56ade4409add1d78eac3b202a9fbd6afbd71878c31f798026082467ace2628

  • SHA512

    bf1ea220ad74153aaf8379dea78cf322171a23cdd44203bbbfea188a2b31d3a9b16e60541eb2aed8c61e3f76c6fc0b983317b00ca31a01a8b63d082bee42f8d6

  • SSDEEP

    384:MoWSkWHa55BgDVRGipkItzY6vZg36Eh7FpmRvR6JZlbw8hqIusZzZvt:7Juk9pHRpcnu2

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

blog.biliianstore.com:1991

Mutex

76e66b105946ffdfd44b4673a61b0c13

Attributes
  • reg_key

    76e66b105946ffdfd44b4673a61b0c13

  • splitter

    |'|'|

Signatures

Files

  • 1728-55-0x00000000003C0000-0x00000000003CC000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections