Behavioral task
behavioral1
Sample
1836-55-0x00000000003C0000-0x00000000003D2000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1836-55-0x00000000003C0000-0x00000000003D2000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1836-55-0x00000000003C0000-0x00000000003D2000-memory.dmp
-
Size
72KB
-
MD5
34c8585f3489be745e509e06b311c855
-
SHA1
abc0dad9b4265c09a879b8770a380c075d69931d
-
SHA256
8e4232565602a9a9e2c339a289508dfc54acab3b87ef736a54d0b5f4611bac4e
-
SHA512
479be6c055b1b00b4b4d7a4e3bcdf988b0f1816241fa2486cddc2a1c03a644c478b517a5f5c0d5bfba777cb1a86231a324fe742abe2a2a7a25c9581ce442b967
-
SSDEEP
384:TZyYL2adsbhKIyK55JoWgEmbr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnv1greT0pqH:dxNiwFKTJH2UuXQ/o61+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
7.tcp.eu.ngrok.io:13225
WindowsEnginee
-
reg_key
WindowsEnginee
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
1836-55-0x00000000003C0000-0x00000000003D2000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ