Behavioral task
behavioral1
Sample
nnn.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
nnn.exe
Resource
win10v2004-20221111-en
General
-
Target
66026e119ed59ade7d697c1619799c552d98fccaa6b79ed3981564b5b11cc070
-
Size
13KB
-
MD5
2815c36931ce57b1e4b28d0a51101b07
-
SHA1
ee25711f1d774d2681293339c807da9bb615ce74
-
SHA256
66026e119ed59ade7d697c1619799c552d98fccaa6b79ed3981564b5b11cc070
-
SHA512
6d49c88cea877df002947b068c269fe6873313fbab7009459d9670356d5e120c2d23f19fca8aea39ed4d52e6b6e90b340eae82e38519e3df8de054d9991f59a6
-
SSDEEP
384:IRRbBHy30D/u3ozsHfKJxpzAv1TKimiNLKFWQeyq/:ITM3iuqsH8dbaKF3ez/
Malware Config
Extracted
njrat
0.6.4
hacked
niras.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
66026e119ed59ade7d697c1619799c552d98fccaa6b79ed3981564b5b11cc070.zip
-
nnn.jpg.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ