Behavioral task
behavioral1
Sample
be9100bdf32727f2e92de4a7b65776b85d5863ee6272cb90a75c2611e12ad6ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be9100bdf32727f2e92de4a7b65776b85d5863ee6272cb90a75c2611e12ad6ed.exe
Resource
win10v2004-20220812-en
General
-
Target
be9100bdf32727f2e92de4a7b65776b85d5863ee6272cb90a75c2611e12ad6ed
-
Size
29KB
-
MD5
844ad42bb79e3c6d4ecf561ad0f7fb30
-
SHA1
3b8cf685449331279e04ecf8e24d41c1ef30c792
-
SHA256
be9100bdf32727f2e92de4a7b65776b85d5863ee6272cb90a75c2611e12ad6ed
-
SHA512
41c550d13dc6659addf7e4cd8e4552d2689c64c4092a8757feb2551b8b925723f6a9d61aae382963a4014732800ab58fa5c910e9d20f754fd4a9d3361c77c5b5
-
SSDEEP
384:wpos5l7l7EMrof6oyr/5NxrimmqDWD4IePUGBsbh0w4wlAokw9OhgOL1vYRGOZzO:wp7GMroynbprsq04IePBKh0p29SgRB0
Malware Config
Extracted
njrat
0.6.4
HacKed
riadhacker00000.no-ip.biz:1177
4a23245b1c653702ddfdf46d4f3f082f
-
reg_key
4a23245b1c653702ddfdf46d4f3f082f
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
be9100bdf32727f2e92de4a7b65776b85d5863ee6272cb90a75c2611e12ad6ed.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ