Behavioral task
behavioral1
Sample
xihwBKCFPQ1i.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
xihwBKCFPQ1i.exe
Resource
win10v2004-20220812-en
General
-
Target
xihwBKCFPQ1i.exe
-
Size
32KB
-
MD5
1ca4496927b605b9219d01f4639c4a00
-
SHA1
a777e0b298c4e7d969e673da93033b5944ba3e67
-
SHA256
9664b724abd8cc4dca9dd910bde9f4dc21605332186a8100c25c4f4a0a3e5b47
-
SHA512
51dcffbaf01990b25c49fb6d673a36d53176c02855cb7db7bbedd12cb50db9fdd61357ea80572df5fde8639062696daa8ef752de9b0fdd668a149a03081f2809
-
SSDEEP
384:E0bUe5XB4e0X0gONNggUBZIGjWTvtTUFQqzF1Obbl:BT9BuiDggUBZIdPbl
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
mr1963.duckdns.org:2163
4cf9c0d460
-
reg_key
4cf9c0d460
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
xihwBKCFPQ1i.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ