Behavioral task
behavioral1
Sample
1e8304c501faf6ee4bdb7d16c9371a16979887b993e0c27e30a70042136c7d11.exe
Resource
win7-20221111-en
General
-
Target
1e8304c501faf6ee4bdb7d16c9371a16979887b993e0c27e30a70042136c7d11
-
Size
29KB
-
MD5
2f356fa060a863b1cbffac943e993c8b
-
SHA1
a97714147a042a4e7948cb22e6684866d742969e
-
SHA256
1e8304c501faf6ee4bdb7d16c9371a16979887b993e0c27e30a70042136c7d11
-
SHA512
565c95127e32d13964808983bcb04c55e43edc666c20f822c3a652cb6cb138c0a8f549006ab69de955029e03ee73c098bba416ddbda671aac97c8c21d6874d7c
-
SSDEEP
768:3xn7Kk4XeP/Fzsq+xre6BKh0p29SgRk0:h7K7W4zx3KhG29jk0
Malware Config
Extracted
njrat
0.6.4
HacKed
tigano0724.myq-see.com:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
1e8304c501faf6ee4bdb7d16c9371a16979887b993e0c27e30a70042136c7d11.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ