Behavioral task
behavioral1
Sample
1508-70-0x0000000000400000-0x000000000041A000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1508-70-0x0000000000400000-0x000000000041A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1508-70-0x0000000000400000-0x000000000041A000-memory.dmp
-
Size
104KB
-
MD5
183c0cd2310a732c02ffe705f3894183
-
SHA1
b32be36d9c060f385bef655fb4539d23fec63450
-
SHA256
4446dffec75e78d35e0b2a9d090f14c437ec786cce39946b3c7cb31aff4dd2c6
-
SHA512
e1550cb5559a9c8475cc87b96ff278d7c55c3c6b0a2673c042c0ef6dac0e54e6ab706bdcd87841796bb07eece29a28a7c82b49f2f8398bc766aba239dabc1dd4
-
SSDEEP
1536:65Y+5clbFdDpmS5wpOk3JCK6pFoHTP6fOpd/9nEh9TGCJOR:/FSQwpOk5CK6XO/9ESCJO
Malware Config
Extracted
njrat
0.7.3
duck
hboduck2013.duckdns.org:1920
Client.exe
-
reg_key
Client.exe
-
splitter
1234
Signatures
-
Njrat family
Files
-
1508-70-0x0000000000400000-0x000000000041A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ