General

  • Target

    1524-86-0x0000000000400000-0x0000000000410000-memory.dmp

  • Size

    64KB

  • MD5

    c2c1c0aa143edac1339c512b59cc5de1

  • SHA1

    dc8cfde6deb0735d084b119861e0192eaa7f5a88

  • SHA256

    1a190db7e378654a2194eda2f6a182ddc01953f0241e39e6979128fc70b081d6

  • SHA512

    a8e742b97c453d6299031bea0092c3ce7bc1f83746c5ea15c92d086d8213ddb5ff50423b6f45f12911f3a9ba669acc9347cef19052a1ea8d3350c9c8238e2fc0

  • SSDEEP

    384:kmOs0IiejvCVLO309QmykrtG+dA+VfwvOSiKrAF+rMRTyN/0L+EcoinblneHQM3h:qFdGdkrgYRwWS9rM+rMRa8NuEDt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.in.ngrok.io:19400

Mutex

900e32528e286bf3fa16f687e637183a

Attributes
  • reg_key

    900e32528e286bf3fa16f687e637183a

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1524-86-0x0000000000400000-0x0000000000410000-memory.dmp
    .exe windows x86


    Headers

    Sections