Behavioral task
behavioral1
Sample
bEhn.exe
Resource
win7-20220812-en
General
-
Target
bEhn.exe
-
Size
23KB
-
MD5
dffbd7034e49e8af1ffb55f1eb2a7401
-
SHA1
cb837595a4a74742e3c92b2c83cd04e4b8fc1992
-
SHA256
7cc7e1f381c7ba108efde283d52ad7955e583e6f9192cf46a593a4a36e6250ef
-
SHA512
4fb4fde9cd93d60ac321b613483b0eb7cdd69043282bb0d8829241a894c10a5eac96699ff353d9bed5605bd0705d7f0511a3df14f499b000c1b870ad6cd06792
-
SSDEEP
384:tweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZTj9:SLq411eRpcnuC9
Malware Config
Extracted
njrat
0.7d
HacKed
windowsii.duckdns.org:5552
85faf5c90182f6391d389f3f4afec300
-
reg_key
85faf5c90182f6391d389f3f4afec300
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
bEhn.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ