Behavioral task
behavioral1
Sample
2020-63-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2020-63-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2020-63-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
c9a71a4865c28f08fe330fc53ae454c5
-
SHA1
ed009e146e3ca01a6fc53588982c77e734b7ef7b
-
SHA256
6722df72f6b74ac3ea16a2dd049a2ecb027717d770a4aec6dfddba3126bfd5d8
-
SHA512
94e1a4b246fb2e60f4ed707a9288f72ca253fa3ecd6a0758a8eaf2d8d6bf96fee143dd5db23e750a043242e65050db3d467b5f2abcd3c4ba34758ee21c05534f
-
SSDEEP
384:rLo5CVFzG+7OA0VsMEvFO4xQi+APqhV3MzAQk93vmhm7UMKmIEecKdbXTzm9bVhM:/wfILxrzA/vMHTi9bDD
Malware Config
Extracted
njrat
v4.0
HacKed
37.0.14.215:4676
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
2020-63-0x0000000000400000-0x000000000040E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ