Behavioral task
behavioral1
Sample
Nx.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Nx.exe
Resource
win10v2004-20220812-en
General
-
Target
Nx.exe
-
Size
32KB
-
MD5
40217a73c8ec3736b3aa5de6cbc426a4
-
SHA1
4ea16128c1f81c4a82eaa6fc454546b9fbc9f804
-
SHA256
1253dc0cabeaeb7ace0813907cc4bd7be0f062b63caadf4fbb61821c8f861048
-
SHA512
614b1d160776677fb6e96047245704444a4f2146ac6789c94507756ca72731ea54e826772d1f661313a07f1d613f0451b838b3b9c46585a3576a77f670ca9857
-
SSDEEP
384:o0bUe5XB4e0XhObL3pixEpfBWT4tTUFQqzFQObb4:dT9Bu4v3pie2b4
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
nyask1.duckdns.org:35888
c76d514af5
-
reg_key
c76d514af5
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
Nx.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ