General

  • Target

    1312-66-0x000000001AC30000-0x000000001AC3C000-memory.dmp

  • Size

    48KB

  • MD5

    19751565473e0cc94b3f8bc0d6c2ace8

  • SHA1

    2fd58a75283d4a76341cecb583f4322afa3ec0ae

  • SHA256

    bd754a2e386774cc705ecb14094636fd6c717039d7c711b1d063ff7fa7123a09

  • SHA512

    6260672fe52dd92ce58cabb6ffca057010a3167e618cafd405700c3aeb1b78fa3510ebd6475d9fb3551e338982e699d26ac02baec259b0369f0884a834f3c4e2

  • SSDEEP

    384:CVLBqbft9pMiemS5Ah1XAY0rh6L03pcyzMdOJ/xJvz2jmzUM9l/Us04Ms:Yq7SkiTlo8JDvUgj/

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

amazon.thedreamsop.com:2211

Mutex

Microsoft® Windows® Operating System

Attributes
  • reg_key

    Microsoft® Windows® Operating System

  • splitter

    |'|'|

Signatures

Files

  • 1312-66-0x000000001AC30000-0x000000001AC3C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections