Behavioral task
behavioral1
Sample
1432-57-0x0000000001D80000-0x0000000001D8E000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
1432-57-0x0000000001D80000-0x0000000001D8E000-memory.exe
Resource
win10v2004-20220721-en
General
-
Target
1432-57-0x0000000001D80000-0x0000000001D8E000-memory.dmp
-
Size
56KB
-
MD5
0e5e5f527c0ef084e3e381445f37056f
-
SHA1
1aa6ae381ae100bccc9de5ef875ca603c128aa48
-
SHA256
3e4960b191ea98d8960024a200e6bb7b2d85b3adcba93b0a93bb127ebbc5a06a
-
SHA512
b19748b3606270427cd97320cfd7bf026b8c7cfd10134f156405f25a0bb78f2b3b41efefd65c42a64faf1a9490705c2b6f34953b0818607e5861cba80dde1596
-
SSDEEP
768:tyK7ZW4Oakw1BJX7oqsKuelBKh0p29SgRI/j:UK78KEJKLKhG29jI7
Malware Config
Extracted
njrat
0.6.4
HacKed
easralahtane.ddns.net:1177
78c3f41e66e57697cb0f063c5b808ae6
-
reg_key
78c3f41e66e57697cb0f063c5b808ae6
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
1432-57-0x0000000001D80000-0x0000000001D8E000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ