Behavioral task
behavioral1
Sample
1976-55-0x0000000000140000-0x000000000014E000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1976-55-0x0000000000140000-0x000000000014E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1976-55-0x0000000000140000-0x000000000014E000-memory.dmp
-
Size
56KB
-
MD5
cd0043fc54000e1f3df815ae1a06ffa8
-
SHA1
0fc0419af51b525c8b2fa6cfadd2f8cdca508309
-
SHA256
47d7803f61b02e9f7f3407ba859c7cedc13940f5d7b8fd4206080a514e4f96f2
-
SHA512
42ae0217f8c4e13c9b4818fedbd3179d63680f10a3b8b8016adf40ab950214f5c7a8e515e2c38c422287c545b93d80823457df0c9b4479c7c6fa491ea499ae99
-
SSDEEP
384:oLtRVub+AUbJrCXgfu6ZQPK2m0M5AQk93vmhm7UMKmIEecKdbXTzm9bVhcaq6kre:W/NS8F5A/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
2023
muhammed1.ddns.net:1177
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
1976-55-0x0000000000140000-0x000000000014E000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ