General

  • Target

    4360-114-0x0000000000F20000-0x0000000000F2C000-memory.dmp

  • Size

    48KB

  • MD5

    78111bae788bb581193c7378ddbf1934

  • SHA1

    728ea5bcc3a15b06e6e70ccb073cc978af444928

  • SHA256

    259ae04e113aaf7fd4fb26b3226f145c55444191e5f42f2883e59cde7398f8f2

  • SHA512

    f1f617cf3f81dcb59e835b0d5721e82572506c7a09758dffac0aee732b66a78e1c08d376375b5e95ad1a27ce8f847122d0aa74aa9c7b0ae04551c2460972988c

  • SSDEEP

    384:TqbjqhfPjAPYQMWSN4hxMEcBXugc2mMTAKZqP+xcV+ocGJN8/S3MqkvzUhX:+nqdqJSwr44/EqioSKBm4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

pcpanel.hackcrack.io:32544

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4360-114-0x0000000000F20000-0x0000000000F2C000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections