Behavioral task
behavioral1
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win10v2004-20220812-en
General
-
Target
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
Size
33KB
-
MD5
538a95adc47384e2b9cc837488628de8
-
SHA1
d0ead0592e2f891d1304be71ccd755c78e94adfa
-
SHA256
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
SHA512
947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
SSDEEP
384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo
Malware Config
Extracted
njrat
0.6.4
Boy Hacker Kurdish
boyhacker.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ