General

  • Target

    2468-3-0x0000000000490000-0x000000000049C000-memory.dmp

  • Size

    48KB

  • MD5

    2a8907d639772b29ac2241f2e38181fe

  • SHA1

    56ca96650ef0693916732ea9411b9fd84caf2b67

  • SHA256

    ad68e99f268840076a2751578bf91b1e45af86c4d7f40fb0199c382e1f3ff4c5

  • SHA512

    2a03ed71636ba70b8042237225e950db06cd55f1758a42c02fa50f72eaca5da1f0ad2e14f04df14db6fd6a53c6633e796189e4db5539f8a9697a4905ba5791f3

  • SSDEEP

    384:9+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZ55:im+71d5XRpcnus

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

FIFA 09

C2

seznam.zapto.org:1177

Mutex

69fac9529d1ca1e2d66c9edf70af1f9d

Attributes
  • reg_key

    69fac9529d1ca1e2d66c9edf70af1f9d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2468-3-0x0000000000490000-0x000000000049C000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections