General
-
Target
1564-3-0x0000000000880000-0x000000000088C000-memory.dmp
-
Size
48KB
-
Sample
240202-va9qcschel
-
MD5
00bede03147d9aed0386c7fe69b3ac1c
-
SHA1
2aa61fb1b2d6e9f371c3fa8fc97fd7dcb64a7f5f
-
SHA256
caffc990b18133478cd266593351c4a8a39e4c32e868732d0e786a738a94846b
-
SHA512
6b10b02f2a5541a134d9cd5cac425a6fb84ee3a3edbbfbcb59f9e40e15ce63bbce04fd955028f7270d5fec8cc92d5c1fee7347cfb18286b7b93704dff8f51d7b
-
SSDEEP
384:X0bUe5XB4e0XHOnNIQgYbr9pfWTotTUFQqz9cObbPwm:8T9BuuNIQVbJjKbPwm
Behavioral task
behavioral1
Sample
1564-3-0x0000000000880000-0x000000000088C000-memory.exe
Resource
win11-20231215-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
milla.publicvm.com:5050
c2d7435e0d60496d8
-
reg_key
c2d7435e0d60496d8
-
splitter
@!#&^%$
Targets
-
-
Target
1564-3-0x0000000000880000-0x000000000088C000-memory.dmp
-
Size
48KB
-
MD5
00bede03147d9aed0386c7fe69b3ac1c
-
SHA1
2aa61fb1b2d6e9f371c3fa8fc97fd7dcb64a7f5f
-
SHA256
caffc990b18133478cd266593351c4a8a39e4c32e868732d0e786a738a94846b
-
SHA512
6b10b02f2a5541a134d9cd5cac425a6fb84ee3a3edbbfbcb59f9e40e15ce63bbce04fd955028f7270d5fec8cc92d5c1fee7347cfb18286b7b93704dff8f51d7b
-
SSDEEP
384:X0bUe5XB4e0XHOnNIQgYbr9pfWTotTUFQqz9cObbPwm:8T9BuuNIQVbJjKbPwm
Score1/10 -