General

  • Target

    632-68-0x0000000000400000-0x000000000040E000-memory.dmp

  • Size

    56KB

  • MD5

    0fc866594ca140fc3b736e2c371b58a5

  • SHA1

    3a01399b8d2fe36dddfdf094b8b5c8d9f96f25ae

  • SHA256

    7fb9462fce10e64d9f06de89dd4c2f7f7843eb17ece7c8153a085f5ef06eb4d0

  • SHA512

    8d29d6e4658672fef2c14aa03d416f33fe0c7985b7386f83aadb48aad960a5012cb67a793656994f8a63053e1beb61afc57590d5c1a95691cff9e3d72f7a8ea5

  • SSDEEP

    384:BLam4PanO4Y7pcdYGiTOCsPodxxMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcaZ611:h63vc7OQzA/vMHTi9bD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

HacKed

C2

194.55.224.37:7777

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 632-68-0x0000000000400000-0x000000000040E000-memory.dmp
    .exe windows x86


    Headers

    Sections