Behavioral task
behavioral1
Sample
50210454605.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
50210454605.exe
Resource
win10-en-20211208
General
-
Target
50210454605.exe
-
Size
32KB
-
MD5
ad6122559d2b098ddbac3bf8309d4fc4
-
SHA1
53824c82f78d4172602ce9ad69e3746cadf46fad
-
SHA256
a4e3944fa206e146cb252849742e921b433b8076723844dd73d2d3afed17ccb3
-
SHA512
aca791b3089a70e50a8fe19a864b168a0b6ef93c2ca52be7bb745db241f01d904d4f2adf80d45c87a3f56b7d895b596d0e9a182df82eb42c7069c195d7454dd9
-
SSDEEP
384:wi0bUe5XB4e0XfODxggUBZIGXWTftTUFQqzFvObbP:w7T9Bu29ggUBZIxFbP
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
dormen.duckdns.org:9000
9c14520e23a24a1
-
reg_key
9c14520e23a24a1
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
50210454605.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ