General

  • Target

    1952-4-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • Sample

    240203-y4yrqsbgej

  • MD5

    3a8a1cf80d20b449ef95ee8b8aedce7d

  • SHA1

    bc0a9f7c4b7bcea2f9e5faaccdb94ed7a8c590a5

  • SHA256

    21985267b201cb505d513b3b7555f165dd7c7fdb0fdc805a043b66a23544fcaf

  • SHA512

    ed8b7932a4a8ae438a9d6338470a9b2e863a5942595c5ecd477ee5f13653aec585a39fffe225c3d6dd7a34787652d0f1b72778999802ae79dae8f702e07b4a1d

  • SSDEEP

    384:v0bUe5XB4e0XfODHixBr/QIWTntTUFQqzFOObbx:ET9Bu2zifrY90bx

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

vinijr27.duckdns.org:3030

Mutex

a4729d8cd4374

Attributes
  • reg_key

    a4729d8cd4374

  • splitter

    @!#&^%$

Targets

    • Target

      1952-4-0x0000000000400000-0x000000000040C000-memory.dmp

    • Size

      48KB

    • MD5

      3a8a1cf80d20b449ef95ee8b8aedce7d

    • SHA1

      bc0a9f7c4b7bcea2f9e5faaccdb94ed7a8c590a5

    • SHA256

      21985267b201cb505d513b3b7555f165dd7c7fdb0fdc805a043b66a23544fcaf

    • SHA512

      ed8b7932a4a8ae438a9d6338470a9b2e863a5942595c5ecd477ee5f13653aec585a39fffe225c3d6dd7a34787652d0f1b72778999802ae79dae8f702e07b4a1d

    • SSDEEP

      384:v0bUe5XB4e0XfODHixBr/QIWTntTUFQqzFOObbx:ET9Bu2zifrY90bx

    Score
    1/10

MITRE ATT&CK Matrix

Tasks