General
-
Target
268-60-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
Sample
240304-dq1nysgd8y
-
MD5
821419b0c0cd2eb83412cbf6828a08fc
-
SHA1
016fdc597e89e7d1438339865997b78945ecfd4e
-
SHA256
2cf5246e4f4f9879a5504098d24c2bec268e993afd24a36a9a5112ef58400d2a
-
SHA512
8dadf44732a77aaab8fecf78288efceb844a48f3a4b7f3a97c4dac77cffb98b70670aab4a7370a59ecd31d9c30a92226ce0e019eebdca3f6b4948f7a292212e8
-
SSDEEP
384:ScqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZsN:F30py6vhxaRpcnu7
Behavioral task
behavioral1
Sample
268-60-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
268-60-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
njrat
0.7d
Lammer
1.tcp.sa.ngrok.io:26266
109825a30066356fe8cef9d37f2520ac
-
reg_key
109825a30066356fe8cef9d37f2520ac
-
splitter
|'|'|
Targets
-
-
Target
268-60-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
821419b0c0cd2eb83412cbf6828a08fc
-
SHA1
016fdc597e89e7d1438339865997b78945ecfd4e
-
SHA256
2cf5246e4f4f9879a5504098d24c2bec268e993afd24a36a9a5112ef58400d2a
-
SHA512
8dadf44732a77aaab8fecf78288efceb844a48f3a4b7f3a97c4dac77cffb98b70670aab4a7370a59ecd31d9c30a92226ce0e019eebdca3f6b4948f7a292212e8
-
SSDEEP
384:ScqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZsN:F30py6vhxaRpcnu7
Score1/10 -