General

  • Target

    4612-3-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    35d26334d67fa61c5895cc756208b4be

  • SHA1

    887444255d043e264f960c4af20b226d22615799

  • SHA256

    e4b6462c4640a95c4f0ffe4e52dba3de4abb0335dcaad65b9c310bd2fa002dc7

  • SHA512

    6c80fdc7501e65ef941c9bcead72daa7d26b3f83696b421df64d71bef6f744344dd7bd8c5ef4573587abd6903423d61dc136cfae0867d509bf74574006c7adcb

  • SSDEEP

    384:UweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZRJ:rLq411eRpcnug

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

18.ip.gl.ply.gg:43389

Mutex

4ac5522ba6619835b9ac056e603570c4

Attributes
  • reg_key

    4ac5522ba6619835b9ac056e603570c4

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4612-3-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections