Behavioral task
behavioral1
Sample
2040-78-0x0000000000400000-0x000000000041A000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2040-78-0x0000000000400000-0x000000000041A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2040-78-0x0000000000400000-0x000000000041A000-memory.dmp
-
Size
104KB
-
MD5
654c7604ff103381a3c3bf76d92baf03
-
SHA1
d0fa1635d3786f63f9162afd49bbf51a56c71d8b
-
SHA256
c5b3a66086eebfac18b081fc90e43dfbc258719f2d229ad8c64af5f727ca8ece
-
SHA512
6460fcd2e4312716fbbe902035f4d6e9dd0928d58212b3f73c2cf9ed1353cf6a707fd7691d928dab75be76f20a85d58043e5fbd22115f8fe66c6d82a186fd2e0
-
SSDEEP
1536:D4C+MYHRDpvS5wpOk3JCK6pFo0Tf6fOpd/9nEh9TGVJIR:WQwpOk5CK6AO/9ESVJI
Malware Config
Extracted
njrat
0.7.3
Lime
sdfgry4.duckdns.org:8090
Client.exe
-
reg_key
Client.exe
-
splitter
123
Signatures
-
Njrat family
Files
-
2040-78-0x0000000000400000-0x000000000041A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ