Behavioral task
behavioral1
Sample
dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea.exe
Resource
win10-en-20211208
General
-
Target
dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea
-
Size
23KB
-
MD5
14c9d9e1c3f8fdb224f8877313958af5
-
SHA1
5db785abbfffb9f687e2ccddabd6a837383f8c4b
-
SHA256
dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea
-
SHA512
70ae376ec36acf2d5b6bb4a3a039f5f7ef6bbdd911016c5843d582e36546bc87b98347227b58355e498bd8f183b03f3732daae9755fb9d5be6b8320ea2b30350
-
SSDEEP
384:vY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZ+a:4L2s+tRyRpcnuy
Malware Config
Extracted
njrat
0.7d
HacKed
rootx.ddns.net:1993
4eaa2408a505bc0920f44b7eb6a94ef3
-
reg_key
4eaa2408a505bc0920f44b7eb6a94ef3
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ