General
-
Target
2316-4-0x0000000000470000-0x000000000047C000-memory.dmp
-
Size
48KB
-
Sample
240522-k42azaab93
-
MD5
c6f0d87977bf54aadc230b99a7ff093c
-
SHA1
542a167dee3830b6b9cdca1110dc83d221a07e0c
-
SHA256
56ab774fedce3b7d6b2264799749708db0fa70cd26e3211abb4850cf78801e01
-
SHA512
eeaeb4517152772c253e878c61b064f35ca97e5180191885f39a9dfa9063812338303b0e24da60b72105a797b0cfb54c32bb7e1215f469683ab3fb2d703684a4
-
SSDEEP
384:+0bUe5XB4e0XuOZeANuiEO0YaHWTgtTUFQqzF8Obbm:vT9ButIguiEYuebm
Behavioral task
behavioral1
Sample
2316-4-0x0000000000470000-0x000000000047C000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2316-4-0x0000000000470000-0x000000000047C000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
seznam.zapto.org:5050
54cc501dc54c435a83
-
reg_key
54cc501dc54c435a83
-
splitter
@!#&^%$
Targets
-
-
Target
2316-4-0x0000000000470000-0x000000000047C000-memory.dmp
-
Size
48KB
-
MD5
c6f0d87977bf54aadc230b99a7ff093c
-
SHA1
542a167dee3830b6b9cdca1110dc83d221a07e0c
-
SHA256
56ab774fedce3b7d6b2264799749708db0fa70cd26e3211abb4850cf78801e01
-
SHA512
eeaeb4517152772c253e878c61b064f35ca97e5180191885f39a9dfa9063812338303b0e24da60b72105a797b0cfb54c32bb7e1215f469683ab3fb2d703684a4
-
SSDEEP
384:+0bUe5XB4e0XuOZeANuiEO0YaHWTgtTUFQqzF8Obbm:vT9ButIguiEYuebm
Score1/10 -