General

  • Target

    2340-5-0x0000000000A40000-0x0000000000A4C000-memory.dmp

  • Size

    48KB

  • MD5

    1d351e7e75546071025e82bd2f9cadfe

  • SHA1

    9ab9f19ec6f099f45b266ef024865662f224ed12

  • SHA256

    22eda7aee80fe6a87908f3ed5838e39f1c2a05cb950bd3c472bcf6b64ab6ceeb

  • SHA512

    5071330275a005259e71f638a22047edafb7bee3d21323406d3dbfbcdd4a5309df4b78faa431065ace574a47daeb30b2d54489045d24934f004bcfbe1dda97ed

  • SSDEEP

    384:50bUe5XB4e0XGOfOLsw0Q0mS038WTptTUFQqzFBObbJ:CT9BuVk5555XbJ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

seznam.zapto.org:5050

Mutex

587285a8a9a841d

Attributes
  • reg_key

    587285a8a9a841d

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2340-5-0x0000000000A40000-0x0000000000A4C000-memory.dmp
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections