Behavioral task
behavioral1
Sample
1996-55-0x0000000000250000-0x0000000000262000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1996-55-0x0000000000250000-0x0000000000262000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1996-55-0x0000000000250000-0x0000000000262000-memory.dmp
-
Size
72KB
-
MD5
24074a9fd679a08b7d1c77667d74d950
-
SHA1
39143f282dc48b03e39794a6b66653eefb1fb798
-
SHA256
76bbd0fd29acc9b21e2467ef06cd624020091cc73761c11907f66f54de94110f
-
SHA512
ec22829ae9b7f284f4e528879cb06ece21c16f02efbe151af34e634fdeb8031098d83add7691db5cc8168dd7cb3bcc48afefebc58247c503f859f9f023f30ff4
-
SSDEEP
384:YZyZUJ1Cj8syWcWrf7E5GiXeEXME5EAftz8Iij+ZsNO3PlpJKkkjh/TzF7pWn9/V:u8UJ04pWcWr7E5ZVMEzXuXQ/ocX+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
0.tcp.eu.ngrok.io:12329
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
1996-55-0x0000000000250000-0x0000000000262000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ