General
-
Target
1952-4-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
Sample
240203-y4yrqsbgej
-
MD5
3a8a1cf80d20b449ef95ee8b8aedce7d
-
SHA1
bc0a9f7c4b7bcea2f9e5faaccdb94ed7a8c590a5
-
SHA256
21985267b201cb505d513b3b7555f165dd7c7fdb0fdc805a043b66a23544fcaf
-
SHA512
ed8b7932a4a8ae438a9d6338470a9b2e863a5942595c5ecd477ee5f13653aec585a39fffe225c3d6dd7a34787652d0f1b72778999802ae79dae8f702e07b4a1d
-
SSDEEP
384:v0bUe5XB4e0XfODHixBr/QIWTntTUFQqzFOObbx:ET9Bu2zifrY90bx
Behavioral task
behavioral1
Sample
1952-4-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1952-4-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
vinijr27.duckdns.org:3030
a4729d8cd4374
-
reg_key
a4729d8cd4374
-
splitter
@!#&^%$
Targets
-
-
Target
1952-4-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
3a8a1cf80d20b449ef95ee8b8aedce7d
-
SHA1
bc0a9f7c4b7bcea2f9e5faaccdb94ed7a8c590a5
-
SHA256
21985267b201cb505d513b3b7555f165dd7c7fdb0fdc805a043b66a23544fcaf
-
SHA512
ed8b7932a4a8ae438a9d6338470a9b2e863a5942595c5ecd477ee5f13653aec585a39fffe225c3d6dd7a34787652d0f1b72778999802ae79dae8f702e07b4a1d
-
SSDEEP
384:v0bUe5XB4e0XfODHixBr/QIWTntTUFQqzFOObbx:ET9Bu2zifrY90bx
Score1/10 -