Behavioral task
behavioral1
Sample
49cf6f89e0a9ef1f6a6459cab972bfc1e96e64e7296863c165a4e5e200902397.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49cf6f89e0a9ef1f6a6459cab972bfc1e96e64e7296863c165a4e5e200902397.exe
Resource
win10v2004-20220812-en
General
-
Target
49cf6f89e0a9ef1f6a6459cab972bfc1e96e64e7296863c165a4e5e200902397
-
Size
29KB
-
MD5
3bfb57dfa93fe960b3c3125049b87d10
-
SHA1
572e1dfb906b05e26512a4861ea1d6767d9ee154
-
SHA256
49cf6f89e0a9ef1f6a6459cab972bfc1e96e64e7296863c165a4e5e200902397
-
SHA512
e48639d10accf07baf55e061d2a06427356a2e4ce894ace3a0ca2466da3ebf70cebaa8b26f588611090e3fb065480f52527e9ef942435a84c2e1166b913d5861
-
SSDEEP
768:Yj77ucYfKQTtzjAqc3eUBKh0p29SgRnk:07hWVUJZKhG29jnk
Malware Config
Extracted
njrat
0.6.4
HacKed
chalohacker.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
49cf6f89e0a9ef1f6a6459cab972bfc1e96e64e7296863c165a4e5e200902397.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ