Behavioral task
behavioral1
Sample
584-68-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
584-68-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
584-68-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
29d96ccf36ec18ce2a7b6d78f2e1d3dc
-
SHA1
0bc0c79b746f1c2cff0f5bf316006eccc5451e25
-
SHA256
f3bf02b3da1dccf5ad10aaf6fb8cdb08ab20f40a79614c619c024e4d9c2ec46c
-
SHA512
b97cc1774c1d4413d18efd9e6bc1d9d66a32d9400cb4c4d594fe14be014a9005dbc61dfecbcc7858e5eea27a453c0b02b54099d67176d134a867433b7b79b5cc
-
SSDEEP
384:WLEBFhM7OA0102PgPGC+YPFhh/MxAQk93vmhm7UMKmIEecKdbXTzm9bVhca36BrZ:QQFXc2EExA/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
updater
alexanderhk228.hopto.org:4432
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
584-68-0x0000000000400000-0x000000000040E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ