Behavioral task
behavioral1
Sample
tmpghwcp1xl.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmpghwcp1xl.exe
Resource
win10v2004-20230220-en
General
-
Target
tmpghwcp1xl
-
Size
27KB
-
MD5
2261e40ba4c08e0c539599b3b9b72ad5
-
SHA1
0b0997b4eb6f6bd262a88d4e146a2cfdafab7b1f
-
SHA256
6828edb8d2bf9ddcd7dce57f8e6ffdb27041e5a50313f915c6fc4dbda6f77ccb
-
SHA512
18d3526e0cd2c425be7e6a77f3626ba4e32544c591f84a10d6e07dd068cd0871f162d27119f0671c5ac1769e47e015a742990142f34055ae2a09057d26063cc9
-
SSDEEP
384:lLET0nO4V7Vg4dYtiK9SPYiGGMdAQk93vmhm7UMKmIEecKdbXTzm9bVhcay46KrZ:lmtGg4UndA/vMHTi9bDy
Malware Config
Extracted
njrat
v2.0
SEND______________EMAIL
2626.libya2020.com.ly:2626
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
tmpghwcp1xl.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ