Behavioral task
behavioral1
Sample
1668-61-0x0000000000400000-0x000000000041A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1668-61-0x0000000000400000-0x000000000041A000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1668-61-0x0000000000400000-0x000000000041A000-memory.dmp
-
Size
104KB
-
MD5
dd1b485ecfa047da88ed0cf67be47f1f
-
SHA1
4f46fd79c117b1bcaa147260b5dd45d5843e06ff
-
SHA256
c2f84198ad9238dd8d7b8d5be099206e197c065c7e5f320fe3d2aeed0af9dd0a
-
SHA512
e26d678dec443bd6455cf37e819f986686e6c1f8fb1ff78659d10b9faa86c52cfd1a958015cbc0acec40961aa12928b8e09d09994b4387af36e26b9461cb7fed
-
SSDEEP
1536:UGa+efzGj1RwVTqMDp8S5wpOk3JCK6pFo4jM6fOpd/9nEh9TG8J8Rg:0zCQwpOk5CK6hO/9ES8J86
Malware Config
Extracted
njrat
0.7.3
Lime
assessment-epinions.at.playit.gg:24620
Client.exe
-
reg_key
Client.exe
-
splitter
123
Signatures
-
Njrat family
Files
-
1668-61-0x0000000000400000-0x000000000041A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ