General

  • Target

    2892-371-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • MD5

    a8985a93d85ead9f4650e53c4e9c4399

  • SHA1

    74bd16f4650894af380e83fa799699651bb7c744

  • SHA256

    b9ae1bde69579101d20d9ec9b8206f57f1d4972363153e00676e5c7d5c709c12

  • SHA512

    2ac6abb6c62e088a8494e67638b5501db397a1844481621a55e44fe6132fe2b0022b632b738477e8170caa8477e4afaeed5c74c2cfa4439ed17d7ac19ccb9293

  • SSDEEP

    384:Fc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZzI:fe9EJLN/yRpcnuj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2892-371-0x0000000000400000-0x000000000040C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections