General

  • Target

    2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp

  • Size

    72KB

  • MD5

    1c298039c674d1243bffd7189636b229

  • SHA1

    305a79eb4d2c48edc2c11765b1d6e8b418d74fef

  • SHA256

    2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7

  • SHA512

    174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8

  • SSDEEP

    384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

abdoooo3.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections