General
-
Target
2012-58-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
Sample
240307-16wq9sgd81
-
MD5
2e160247e527ddb52cd2547b1bd1e2aa
-
SHA1
424f42a40bb17503a676d9a3e39826f79e3396b8
-
SHA256
85cd5ecb7eb95c6b1692761276806c81f5b8009e19c8ec19cc36143baac01d09
-
SHA512
26eb5ed16822dce8eb7779020633e71f855f33aef7304d4d83d77be10e7462a3fdf136ba8fceb40e34b81d009bcfddb39161bfae8145a7146defab98b2cca38e
-
SSDEEP
384:q0bUe5XB4e0X+OlhiaXLilpknDwWT4tTUFQqz9YObb:zT9BudCaXWlFub
Behavioral task
behavioral1
Sample
2012-58-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2012-58-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
juancaf4000.duckdns.org:5050
2925ee0393c24d569
-
reg_key
2925ee0393c24d569
-
splitter
@!#&^%$
Targets
-
-
Target
2012-58-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
2e160247e527ddb52cd2547b1bd1e2aa
-
SHA1
424f42a40bb17503a676d9a3e39826f79e3396b8
-
SHA256
85cd5ecb7eb95c6b1692761276806c81f5b8009e19c8ec19cc36143baac01d09
-
SHA512
26eb5ed16822dce8eb7779020633e71f855f33aef7304d4d83d77be10e7462a3fdf136ba8fceb40e34b81d009bcfddb39161bfae8145a7146defab98b2cca38e
-
SSDEEP
384:q0bUe5XB4e0X+OlhiaXLilpknDwWT4tTUFQqz9YObb:zT9BudCaXWlFub
Score1/10 -