Behavioral task
behavioral1
Sample
4c4cde53f116d04cf0348abd92a0ddebe2eaa8da5fc4f68914fc52aceabb70d9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4c4cde53f116d04cf0348abd92a0ddebe2eaa8da5fc4f68914fc52aceabb70d9.exe
Resource
win10v2004-20220901-en
General
-
Target
4c4cde53f116d04cf0348abd92a0ddebe2eaa8da5fc4f68914fc52aceabb70d9
-
Size
385KB
-
MD5
16045e55c6ea8355c1564ffe6da90acc
-
SHA1
b79aefd3cb21d7ac4ec1e2fd9144451edbb72fb9
-
SHA256
4c4cde53f116d04cf0348abd92a0ddebe2eaa8da5fc4f68914fc52aceabb70d9
-
SHA512
d2c4c7af3fd449935a873d0bfe58eb6edcab9fb6313c91a673308c4a32cd07fefc7915deb107edc2fbf3f6fb0e626f52498db12a1dbe4308b1b2ff6c2c31073b
-
SSDEEP
768:NIU0tw3RpcnuB+vMMMMMMMMMMMMnGnqv:NIU0q3RWugvMMMMMMMMMMMMnGq
Malware Config
Extracted
njrat
0.7d
MoDy LoOoRD
hacker1hack.ddns.net:1177
db5f053dc9d6989013c0f6022f68b72b
-
reg_key
db5f053dc9d6989013c0f6022f68b72b
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
4c4cde53f116d04cf0348abd92a0ddebe2eaa8da5fc4f68914fc52aceabb70d9.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 362KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ