General
-
Target
Server.exe
-
Size
23KB
-
MD5
0965ac2d0351b50b734991c11d465243
-
SHA1
09be6d0493435046743276d2da934b85712ba28e
-
SHA256
d8f66d5b7e2aafa589ee790e6babe7c22daa683d8a50272c7b18d42a250d6878
-
SHA512
f75221b4e4f5a9ec524b66ee494e83bdd43fdbf7a7e741468105ee9a417a5e9a8ca60f903ab383f71a8083b373abc4f60f98a38ebb240868397881eb796a8ad6
-
SSDEEP
384:TQeCITxTz/w8nEUeC9UBNM46VgDO61Ba6hRmRvR6JZlbw8hqIusZzZrq:E2brV93RpcnuV
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
165d6ed988ac1dbec1627a1ca9899d84
-
reg_key
165d6ed988ac1dbec1627a1ca9899d84
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
Server.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ