Behavioral task
behavioral1
Sample
ratka.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ratka.exe
Resource
win10v2004-20220414-en
General
-
Target
ratka.bin
-
Size
43KB
-
MD5
e01e74c608fddd8dd1581cc12ba596b8
-
SHA1
ab7b8cc4726dae0db4619af8db0923872ae86981
-
SHA256
3605f24cb3b60751d304359176d41c224c150caa7a5f670d373b9a84479ce067
-
SHA512
013d1d8fc44b80e92e7c2d3fa1dc6ed6a38d04e0cead3d0990eb5cb6c614a45185f67e7ad3b7bb5a0f59216f61a29ff6587b55b6aaf1cb2ae811409fcc882edd
-
SSDEEP
384:MZyqIYz/wpa9GP4Uy2vXy2m2EUSlhqzIIij+ZsNO3PlpJKkkjh/TzF7pWnaL/gra:qZIKR4gh2vyV2SwuXQ/or3+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
7.tcp.eu.ngrok.io:18065
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
ratka.bin.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ