General

  • Target

    2232-2-0x00000000004C0000-0x00000000004CC000-memory.dmp

  • Size

    48KB

  • MD5

    041d1fbeab0c50644ba50b6d4401c4cb

  • SHA1

    82dff292fcb6b9445021cf8cc10ac2338bdd67cb

  • SHA256

    d09b45a78151c97f1ccad3497b286daf7dc5a6386c6164ff88f9d91e1de4469b

  • SHA512

    2098fcabb43943c6414b3fa6cb7613ec734d8d6bc33b67dca33b6232c09e4b381ed962d9efbdf805c2b299af5517050467c62cd75bd893833d23b2d727b4856f

  • SSDEEP

    384:v0bUe5XB4e0XJgONOSjgkMaWT8tTUFQqz9mVObbI:ET9Bu9cSjeu4bI

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

seznam.zapto.org:5050

Mutex

51f5e4b21a09

Attributes
  • reg_key

    51f5e4b21a09

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2232-2-0x00000000004C0000-0x00000000004CC000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections