Behavioral task
behavioral1
Sample
d7dddeca5223d3a8dcb49fd9cb25bc3646df72dbe528081f65bee2093b1e736b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7dddeca5223d3a8dcb49fd9cb25bc3646df72dbe528081f65bee2093b1e736b.exe
Resource
win10v2004-20221111-en
General
-
Target
d7dddeca5223d3a8dcb49fd9cb25bc3646df72dbe528081f65bee2093b1e736b
-
Size
29KB
-
MD5
9ee43216b3fbb877c0fd022d34d544cf
-
SHA1
4a263af529fd18b2cf8085725c51e997eebf4b67
-
SHA256
d7dddeca5223d3a8dcb49fd9cb25bc3646df72dbe528081f65bee2093b1e736b
-
SHA512
138d5aebc20a5824dc8402e4846682b347ce454551f58fe1775513deb0ce7ed41ff2423d128e1c2b1cb3e3693c8049cb6d45963922a9a2cdefc3f08f87106a70
-
SSDEEP
768:MjHJ7dYhlcIsm6cqQseKBKh0p29SgRtzE:0J7dL6lFiKhG29jtzE
Malware Config
Extracted
njrat
0.6.4
Ƹ̵̡Ӝ̵̨̄Ʒ(●̮̮̃●̃)●▬▬welcome▬▬●(●̮̮̃●̃)Ƹ̵̡Ӝ̵̨̄Ʒ
kitkat-egy.ddns.net:2299
69bbfd50516c56a11bac849b3c302614
-
reg_key
69bbfd50516c56a11bac849b3c302614
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
d7dddeca5223d3a8dcb49fd9cb25bc3646df72dbe528081f65bee2093b1e736b.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ