Behavioral task
behavioral1
Sample
2020-55-0x0000000000140000-0x0000000000152000-memory.exe
Resource
win7-20221111-en
General
-
Target
2020-55-0x0000000000140000-0x0000000000152000-memory.dmp
-
Size
72KB
-
MD5
93fee5aaf3adcf742d24fcc644f6b1bd
-
SHA1
358bf553a088e3d12a9a37e962f89619f236bee9
-
SHA256
73a06124370969460119a77d1f80fc6d80e8760912e997ef68ad812bcc1bbbf1
-
SHA512
cad474a1c7c188cbeddf40c2e6371962e42029a8e0b1523f67a745e59c402c4681d55eaf5eb8916072500b28a3be1ffdcc3e40fc65cf836dec24237177e3eaff
-
SSDEEP
384:+ZyqCFIB+oyiB5JQ6gEv4vIubzQIij+ZsNO3PlpJKkkjh/TzF7pWnamgreT0pqfT:E0+IliTJjg1uXQ/ojq+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
7.tcp.eu.ngrok.io:13850
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
2020-55-0x0000000000140000-0x0000000000152000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ