Behavioral task
behavioral1
Sample
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe
Resource
win10v2004-20220812-en
General
-
Target
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b
-
Size
29KB
-
MD5
c126e0f1c902ecc3c38a70201a3ff596
-
SHA1
7f2f7546361464ac039fc7f59a40c2bbe72fe60b
-
SHA256
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b
-
SHA512
499030cf4ca86ee53304998100133603c940db3e6c40c9b1c31a901cce50d8201ffa283aa27abd645e75405708a308699c102ae48b8998eab0c5825e89199ec1
-
SSDEEP
384:ABgJGJl7tj1Msagab1h5Vh+2CWmrDRbD59ePbGBsbh0w4wlAokw9OhgOL1vYRGO5:AZ7nMsanzR+2crdDveyBKh0p29SgRxR
Malware Config
Extracted
njrat
0.6.4
HacKed
supermorad.no-ip.biz:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ