Behavioral task
behavioral1
Sample
1452-57-0x00000000009B0000-0x00000000009BC000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1452-57-0x00000000009B0000-0x00000000009BC000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1452-57-0x00000000009B0000-0x00000000009BC000-memory.dmp
-
Size
48KB
-
MD5
3d0c9b1cbd007a79d0df93c6249a24bc
-
SHA1
940e4787edaae8f71b10ae5574aa0267ec192341
-
SHA256
ea1b0187bbd1a48bd632fddc7e2b367148e13827901cc06e10999a9b3baec8ef
-
SHA512
4a9b6923ee468b45f05df607aa09f961ed262f3b4a5be5116d1335781c957edaecaf94513acc726b904241dc75b4ceb0a72d646f13674d4fa2da97d61664d2b3
-
SSDEEP
384:ksqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZxH:rSoQA6mlcrRpcnu2
Malware Config
Extracted
njrat
0.7d
HacKed
easralahtane.ddns.net:3973
de691f5a23326e1eca32cf33144b3175
-
reg_key
de691f5a23326e1eca32cf33144b3175
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
1452-57-0x00000000009B0000-0x00000000009BC000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ