General
-
Target
2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp
-
Size
72KB
-
Sample
231204-zma5safd9v
-
MD5
1c298039c674d1243bffd7189636b229
-
SHA1
305a79eb4d2c48edc2c11765b1d6e8b418d74fef
-
SHA256
2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7
-
SHA512
174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8
-
SSDEEP
384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L
Behavioral task
behavioral1
Sample
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
abdoooo3.ddns.net:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp
-
Size
72KB
-
MD5
1c298039c674d1243bffd7189636b229
-
SHA1
305a79eb4d2c48edc2c11765b1d6e8b418d74fef
-
SHA256
2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7
-
SHA512
174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8
-
SSDEEP
384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L
Score7/10-
Drops startup file
-
Adds Run key to start application
-