Behavioral task
behavioral1
Sample
0c13d980b8c33bac30892c4933511c71169001944a8611f7d021e2d51987f8e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c13d980b8c33bac30892c4933511c71169001944a8611f7d021e2d51987f8e2.exe
Resource
win10v2004-20220812-en
General
-
Target
0c13d980b8c33bac30892c4933511c71169001944a8611f7d021e2d51987f8e2
-
Size
29KB
-
MD5
a2ef74f40e2a9ba2d522e915e61160a0
-
SHA1
13fefaad180b4e4f64863eeab52f07e54916442e
-
SHA256
0c13d980b8c33bac30892c4933511c71169001944a8611f7d021e2d51987f8e2
-
SHA512
d83304cd4c3cf1080fe505ca594d284004c0c1c76b98a141a60a2c6fafbd4453e6769b02c92575341c928d02b15db87f47a4db31c22f1e0524f8492090bb5ef4
-
SSDEEP
384:UBgJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGO0:UZ7nMsanzR+2cqEDveyBKh0p29SgRVg
Malware Config
Extracted
njrat
0.6.4
HacKed
campershoot.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
0c13d980b8c33bac30892c4933511c71169001944a8611f7d021e2d51987f8e2.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ