Behavioral task
behavioral1
Sample
0edd453764ea4156966727e07bcec79a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0edd453764ea4156966727e07bcec79a.exe
Resource
win10v2004-20220812-en
General
-
Target
0edd453764ea4156966727e07bcec79a.exe
-
Size
47KB
-
MD5
0edd453764ea4156966727e07bcec79a
-
SHA1
892d9f39638b3b4046acaab4de5bfacb7335b4a2
-
SHA256
5dce060530255df2db5e5dc505f505ad5d169e8c5586c189659a3ca0e8c0459d
-
SHA512
24df614d28993df542caadac6a4c9819a083321fc0babd2ce73467ab53b4bdf5a82658eb84198be61d09ce97b68d1dd73c8f516f34ce8f29edb3103ad1cdda96
-
SSDEEP
384:wZyqjwolYxOoyi0ytYcm6MNiMFQVa9D9O5UE5QzwBlpJNakkjh/TzF7pWnn1grel:2IouIli0kYDviqWvQO+er+L4X
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
system
7.tcp.eu.ngrok.io:10504
Discord Update
-
reg_key
Discord Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
0edd453764ea4156966727e07bcec79a.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ