Behavioral task
behavioral1
Sample
0x000c0000000054a8-55.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0x000c0000000054a8-55.exe
Resource
win10v2004-20220812-en
General
-
Target
0x000c0000000054a8-55.dat
-
Size
37KB
-
MD5
6ffe6d49b69542428cc62515b9f5eb97
-
SHA1
102eeb2271909934c31d2bd92917f73e307805e8
-
SHA256
d82a46b2a852c6cfb6e62d94847f6a6eff33707b1d6098a882fa6853198bdd5f
-
SHA512
1f6c7cdeeec71ae4bb29b7f4af75459e758776734da83adeb527ff5c228373f2db6f218d791cdf3bb6d35cc0e0b5858b1eeddbe8e41b4c6bc62773b85a58ea48
-
SSDEEP
384:n5FqjcXCispfcR9L5YXyc/OS/M1EzH127ItnC+B7rAF+rMRTyN/0L+EcoinblneS:n/1j5Yic/hBUI4+BrM+rMRa8Nuj3t
Malware Config
Extracted
njrat
im523
хакнутый
5.tcp.eu.ngrok.io:14626
004c72a44463b9dde7e4385ae61fc73c
-
reg_key
004c72a44463b9dde7e4385ae61fc73c
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
0x000c0000000054a8-55.dat.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ