Behavioral task
behavioral1
Sample
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe
Resource
win10v2004-20220812-en
General
-
Target
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.zip
-
Size
10KB
-
MD5
e14bfca742c35bee2c39bcbdb904dec3
-
SHA1
4955584bc5b95a45d68d4203705e822ca6902c80
-
SHA256
f3a196c1a71bbcb30d6aa8dcb01b4fb60c49446b6b704b821281e38ac31227e9
-
SHA512
a495e695e5d9a9c0ebf5985f48f2963c894d296116bd691cf27aeee747c99a540ff95bb5f12a00f9fb9d70c3d94d288f369c213ab0bf2ac6c6de401b476cbf02
-
SSDEEP
192:ACX1n2Cn6cguyX+tFhAm3T3oWPRtzOxGy/r6iah8i6Kd/jTCh7:nXECn6vue+vTsWPmL/r697dbTCF
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
nyas22.duckdns.org:57831
8521e1f80fc24
-
reg_key
8521e1f80fc24
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.zip.zip
Password: infected
-
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ