Behavioral task
behavioral1
Sample
a977e88363e8c54990f2306905b9ce0d5a63f2fe3f7a6011afcd443682ae2f89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a977e88363e8c54990f2306905b9ce0d5a63f2fe3f7a6011afcd443682ae2f89.exe
Resource
win10v2004-20220901-en
General
-
Target
a977e88363e8c54990f2306905b9ce0d5a63f2fe3f7a6011afcd443682ae2f89
-
Size
29KB
-
MD5
811168a10e1f8746f0d6f0a2212ce940
-
SHA1
87c4d3c4b69140971135a32d652f425da7cae9f1
-
SHA256
a977e88363e8c54990f2306905b9ce0d5a63f2fe3f7a6011afcd443682ae2f89
-
SHA512
a21fdcf0aa924ca411bbf3e461128139445577c0b7db576274ed07a4b4ee63c98e0f3b6212a1760d85ace791e0d8ebf0fe40d39ec95f8f978255edbf833da4a0
-
SSDEEP
384:laFCtl7Dh+oqIqE5p5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZzhGm:774oqIjbLTAqM3eFBKh0p29SgRp3vB
Malware Config
Extracted
njrat
0.6.4
HacKed
henooo07.zapto.org:22
e034a9a04a61f7869d8934536f5eb859
-
reg_key
e034a9a04a61f7869d8934536f5eb859
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
a977e88363e8c54990f2306905b9ce0d5a63f2fe3f7a6011afcd443682ae2f89.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ