Behavioral task
behavioral1
Sample
nigger6667.exe
Resource
win10v2004-20221111-en
General
-
Target
nigger6667.exe
-
Size
27KB
-
MD5
215ac217c5e871f2d52e7eb50576a131
-
SHA1
4af6c66a5b1e119e6b45caac944cf708c5f0c7c5
-
SHA256
71252f80603f69e9c9370030d3cf7384b92d78a1e44fe99ddf8bfe928aedc0b3
-
SHA512
c99769c93232591d3d5cd3986955a12b110c179d17d9b4aa148d6fa80a853e6ea4d76975f94c403d1c9bec5956e004c58742348de802ae1a6392ffa67ae6b2ae
-
SSDEEP
384:UcLbe6lnw3m4Afp1UDMoC2PDdVlMMAQk93vmhm7UMKmIEecKdbXTzm9bVhcaZL6a:U6beyBPqqMA/vMHTi9bDZ
Malware Config
Extracted
njrat
v4.0
HacKed
outdoor-geo.at.ply.gg:39605
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
nigger6667.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ