Behavioral task
behavioral1
Sample
1e4af6db3b00aac1f959e61d762837d2.exe
Resource
win7-20220901-en
General
-
Target
1e4af6db3b00aac1f959e61d762837d2.exe
-
Size
27KB
-
MD5
1e4af6db3b00aac1f959e61d762837d2
-
SHA1
5dc86c39c1993e8e80d6051e5b985ce66d8e4624
-
SHA256
241f37fd8dace0aa706ee2e30ecceb715118ec0b8971284586f52bbb2d74f48b
-
SHA512
624ca25290ee7acb0c1b2a7ddc3c44f91c5a65a9672713336830ecb4f95272fd71fbab128d2b880eea258c4c4626854c31577c5f1b79dbb2591912449ca8ccb7
-
SSDEEP
384:FELam4PanO4Y7pcdYGiTOCsPodxxMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcaB6N:c63vc7OQzA/vMHTi9bD
Malware Config
Extracted
njrat
v4.0
HacKed
51.103.25.183:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
1e4af6db3b00aac1f959e61d762837d2.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ