Behavioral task
behavioral1
Sample
5e150e12f7ead84c5fbc9ac02c1ade087c3a0067819e9aa363e0d90a223167b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5e150e12f7ead84c5fbc9ac02c1ade087c3a0067819e9aa363e0d90a223167b6.exe
Resource
win10v2004-20220812-en
General
-
Target
5e150e12f7ead84c5fbc9ac02c1ade087c3a0067819e9aa363e0d90a223167b6
-
Size
29KB
-
MD5
f94ed3583aa2fc8c3b5964a75bcc5460
-
SHA1
ce04221ff0268546630b021bd87fbdf394210ba5
-
SHA256
5e150e12f7ead84c5fbc9ac02c1ade087c3a0067819e9aa363e0d90a223167b6
-
SHA512
e727e3552e864c8524dee0721c29a9434ab2b919780e5ac14cc2d6cc65c8896a49af933df93e8866ada9663ee10446c7562bce474b04588557851998f82f510d
-
SSDEEP
384:oZCINl7rZt4AgSTnd5fGmjmumqD418+eYKGBsbh0w4wlAokw9OhgOL1vYRGOZzqr:o/7v4AgMdgmjAq8XeIBKh0p29SgRM5
Malware Config
Extracted
njrat
0.6.4
HacKed
mamostayanpoolllll.ddns.net:1177
368fc7f563096ad51849f0d2c298fc08
-
reg_key
368fc7f563096ad51849f0d2c298fc08
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
5e150e12f7ead84c5fbc9ac02c1ade087c3a0067819e9aa363e0d90a223167b6.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ