General

  • Target

    296-135-0x0000000000D10000-0x000000000108E000-memory.dmp

  • Size

    3.5MB

  • MD5

    16bf093cfc5a66fa3f045c76695f598f

  • SHA1

    e52e016e54a09d426c42d4534cb9731277476404

  • SHA256

    ab5476bb26206f6cee777450aeb970b8f0dda25f09c55151d876b44431d2db50

  • SHA512

    c25b9990e5b120808b7be4cd193757f7e280b827c2caa07dc0f1a77e22c9f96b15e6ac97c98af73036bac2cd4fd6db527b1849137f72dfcffdf7011063f35654

  • SSDEEP

    49152:IiZbAtRZRpPco3TjIk5m646mdXIHMbeeCoP/QoPDz/nK9E4UX:txAtRZzB3IBBOsbeeCS/5z/nK9E4

Score
10/10

Malware Config

Extracted

Family

njrat

C2

hakim32.ddns.net:2000

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 296-135-0x0000000000D10000-0x000000000108E000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections