Behavioral task
behavioral1
Sample
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe
Resource
win10v2004-20220812-en
General
-
Target
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.zip
-
Size
10KB
-
MD5
40650e3bd10d2f095cd6bbc26754d7f1
-
SHA1
39c43c308f69b95637b853321ae7f36edc832cff
-
SHA256
a477b35d5df3c1a449e42026ad7d26b17579d3f519263be93352a6014326b179
-
SHA512
56940d7e1a585be412d9900aa0b8ce9a8064206c5aa845923c121a65d8134206be0b242d1d9dd7372d7be99cc7b5b1742da003987773ee3906ec611c3920214c
-
SSDEEP
192:V079m9rPeGtd312YhjeBUVAEjDrKxH0s0mhgqrOh95hTbXq:CYPvdFBh6BIAEjDmxnphnih95Z+
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
nyas22.duckdns.org:57831
8521e1f80fc24
-
reg_key
8521e1f80fc24
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.zip.zip
Password: infected
-
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ