General
-
Target
3588-157-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
Sample
230710-pfppgsba8v
-
MD5
db18bbc2d2c9d6bba73e22755187da81
-
SHA1
4521496a7dee0ac24830dfdc27a25765e2a69a4f
-
SHA256
18b2ab24db7281f8ee0ac5334c454c8c7a4d2919ce1d3b521c32cc54d35a54b0
-
SHA512
3e750cb7884814e880191fe76c2dddccef448636fbc4495a5338664ae7b555ef1c7275a351208daf7039864badb6ede7218eae94114bffc85903b67de71affd2
-
SSDEEP
384:W0bUe5XB4e0XeOZHixBr/QFWTatTUFQqzFDObbm:3T9Bu9difrY3Vbm
Behavioral task
behavioral1
Sample
3588-157-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3588-157-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
todosnj4343.duckdns.org:4343
91870a25e1f
-
reg_key
91870a25e1f
-
splitter
@!#&^%$
Targets
-
-
Target
3588-157-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
db18bbc2d2c9d6bba73e22755187da81
-
SHA1
4521496a7dee0ac24830dfdc27a25765e2a69a4f
-
SHA256
18b2ab24db7281f8ee0ac5334c454c8c7a4d2919ce1d3b521c32cc54d35a54b0
-
SHA512
3e750cb7884814e880191fe76c2dddccef448636fbc4495a5338664ae7b555ef1c7275a351208daf7039864badb6ede7218eae94114bffc85903b67de71affd2
-
SSDEEP
384:W0bUe5XB4e0XeOZHixBr/QFWTatTUFQqzFDObbm:3T9Bu9difrY3Vbm
Score1/10 -