General

  • Target

    1140-55-0x0000000000460000-0x000000000046C000-memory.dmp

  • Size

    48KB

  • MD5

    818ffb5c406420d19b68d0925615ad2c

  • SHA1

    969440dd4a42520b1ef5cf349d5687ec9f52e89b

  • SHA256

    8ea00ba56a22afc5dd4ba3d19144f7d3affa973ac6385796971910f53895d98f

  • SHA512

    08b0da61910bf03cf75a2fa483483a9525d9cc34444e0c2fe020eeaadd03690702f3367d8c987a03a87c64112e998b518a632ff43fa0439f65b979450e5448d7

  • SSDEEP

    384:h0bUe5XB4e0XoOfOIQq1pvmufCsIsFWTNtTUFQqz9MObbn:6T9Bu/JQqvvmu6xmbn

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

65.0.50.125:22797

Mutex

c89fddc8412242569f1

Attributes
  • reg_key

    c89fddc8412242569f1

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1140-55-0x0000000000460000-0x000000000046C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections