Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20220721-en
General
-
Target
server.exe
-
Size
37KB
-
MD5
4bc8c9f0374e9e8b462ba68c3c05cbc8
-
SHA1
d23e233c019deb218dc12656b6068ed6bb1e0f09
-
SHA256
1caefcd78f2581528f9ffe0dd5e3832dff1d4cc72168716145d59ceb0388f000
-
SHA512
302068d057b831233057f3fd033f7d5a4b4fabca328ac135d637fc80119a2be938681e04951734b8078ad6a08a69dc59b279d0ae94f2db844c9a37adfcdb55d5
-
SSDEEP
384:BJu/T8RgibBjpPu7w9qyMTO1P5IsW+LJbrAF+rMRTyN/0L+EcoinblneHQM3epzi:+2NN9ZMTO1GV+prM+rMRa8Nuc5t
Malware Config
Extracted
njrat
im523
HacKed
positive-be.at.playit.gg:14456
c79c8749d02e545a8c69b1379eed97c4
-
reg_key
c79c8749d02e545a8c69b1379eed97c4
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
server.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ