Behavioral task
behavioral1
Sample
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7.exe
Resource
win10v2004-20220812-en
General
-
Target
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7
-
Size
28KB
-
MD5
78efb2985f75a78d6eb60c9e20105a00
-
SHA1
5365036ebf892aa15b99593f3c848c05e55e7e38
-
SHA256
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7
-
SHA512
5e70b73e881b9ffe063569f633bda66d013859d6766670df8d29f9f6445915b17b7d68af58376bdfedf5979221146633d0f280d90f0075eb39fece2773254252
-
SSDEEP
384:AxUHEBl7p3hUw2s7bD55gEKemqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzZ/:A17bUw2C3kEcqNreHBKh0p29SgRjp
Malware Config
Extracted
njrat
0.6.4
HacKed
ahmedtita.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ