Behavioral task
behavioral1
Sample
536-55-0x0000000000350000-0x0000000000362000-memory.exe
Resource
win7-20220812-en
General
-
Target
536-55-0x0000000000350000-0x0000000000362000-memory.dmp
-
Size
72KB
-
MD5
a99a2106a862bc08ae4f945502a06975
-
SHA1
45f7f99a6d2e39d0d9be2a0747fd55d789fe32ea
-
SHA256
80a1c68970a2643c2fd8bd7acdba3ca5b6490d8b83db41b03aaf9b10152c94ce
-
SHA512
6edb168246c976d80a74f98e69e9e546e8cbbef907db4fd102721d89bc02c674405d50d7a3f979b25374bff2dbf848a46a25e3b389200a521a657a9737e21f2b
-
SSDEEP
384:gZygGFgpWoy7LvW+wKEhxignq3zoIij+ZsNO3PlpJKkkjh/TzF7pWnMgheT0pqfT:G+Wol7jW70gauXQ/o3+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
Hacked
4.tcp.eu.ngrok.io:15025
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
536-55-0x0000000000350000-0x0000000000362000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ