Behavioral task
behavioral1
Sample
12bfaee26247afa87b2fb2d22b3e60e83570e796f2c87506391b17e06a530041.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
12bfaee26247afa87b2fb2d22b3e60e83570e796f2c87506391b17e06a530041.exe
Resource
win10v2004-20220812-en
General
-
Target
12bfaee26247afa87b2fb2d22b3e60e83570e796f2c87506391b17e06a530041
-
Size
23KB
-
MD5
835f822b773b573a1a3e177ca57d55c0
-
SHA1
9fc9c3349f4585c1deb072ae4dee630fb4669842
-
SHA256
12bfaee26247afa87b2fb2d22b3e60e83570e796f2c87506391b17e06a530041
-
SHA512
29012dd10f74fe54728e42d28a854d1e7a6b99c71681480c8015b815c4a7d56674e502aa43b50f3878f5fefc5d8eb486ddb4cf7fd79dc9da3c3513ab8b81a98e
-
SSDEEP
384:UcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZk6:D30py6vhxaRpcnuw
Malware Config
Extracted
njrat
0.7d
hacked
ninoahmed.no-ip.biz:1111
2aee6e98b2b9a89b2e53307bff009b1f
-
reg_key
2aee6e98b2b9a89b2e53307bff009b1f
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
12bfaee26247afa87b2fb2d22b3e60e83570e796f2c87506391b17e06a530041.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ