Behavioral task
behavioral1
Sample
1224-6009-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1224-6009-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1224-6009-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
1d0e19b0f5bef53aaac9b213bf2e6cbc
-
SHA1
a33e207ce03d79469864ba33e41a8ff15959ddb1
-
SHA256
5094e60e2fa935f5737c2cf5f471c0f90662422f341725e6c22189c767828622
-
SHA512
e656b612cc9628f3166aed53c9d26c39a7141552f75f631f3cbf01475cead61ca25fe5ecff8630527f5a38bee291d1028beafa2c6e04b2694712b85f7e69e62b
-
SSDEEP
384:OLGCnWzGgqhZArwvaGGuPh5BrMtAQk93vmhm7UMKmIEecKdbXTzm9bVhcaP6Yr6s:YxvMAitA/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
update
money2022.ddns.net:8080
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
1224-6009-0x0000000000400000-0x000000000040E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ