General
-
Target
1712-55-0x00000000007D0000-0x00000000007DC000-memory.dmp
-
Size
48KB
-
Sample
240306-c4gbssac73
-
MD5
1b0c45e30ae190702e90769b59dea9e0
-
SHA1
6e3b27579842fa1afd99f9bba46ad97838aed131
-
SHA256
6214a54c2992eae1a43b9ebc84d3231b9e7f88c8ab669b1e92a413d03c6675dc
-
SHA512
e809338d704911efb4166e0375250ef211c7e58d3121583b0440f8ffb63080a25f49cb8c48d5de1dffa3fea60f17d0f1a381e65bddc8386e0185c51ecf8379b4
-
SSDEEP
384:00bUe5XB4e0XmOD5IQgYbr9pNWT+tTUFQqz91Obbu:RT9Bu1dIQVbJnTbu
Behavioral task
behavioral1
Sample
1712-55-0x00000000007D0000-0x00000000007DC000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1712-55-0x00000000007D0000-0x00000000007DC000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
seznam.zapto.org:5050
bdbc787958c849898
-
reg_key
bdbc787958c849898
-
splitter
@!#&^%$
Targets
-
-
Target
1712-55-0x00000000007D0000-0x00000000007DC000-memory.dmp
-
Size
48KB
-
MD5
1b0c45e30ae190702e90769b59dea9e0
-
SHA1
6e3b27579842fa1afd99f9bba46ad97838aed131
-
SHA256
6214a54c2992eae1a43b9ebc84d3231b9e7f88c8ab669b1e92a413d03c6675dc
-
SHA512
e809338d704911efb4166e0375250ef211c7e58d3121583b0440f8ffb63080a25f49cb8c48d5de1dffa3fea60f17d0f1a381e65bddc8386e0185c51ecf8379b4
-
SSDEEP
384:00bUe5XB4e0XmOD5IQgYbr9pNWT+tTUFQqz91Obbu:RT9Bu1dIQVbJnTbu
Score1/10 -