Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
General
-
Target
tmp
-
Size
37KB
-
MD5
ffd88ba9cce1361a6830575030d3f936
-
SHA1
0ab71ae0328c284a4c4eb089b59fb5c46c857784
-
SHA256
df27c07e9623bc87589db6cf4159dcf6cd37e8709b9564f60412ff9724ef0678
-
SHA512
90489531752c6c1c0a2987d10bc6536d963c1ba052a974da4d4f7019a82bd1e6b3c3923abd77ac66f7f2bd883141323806fa411bf5703053668a756328897ed9
-
SSDEEP
384:gUbsiDlT95hL5YyUvjh/xOi4aaF3lrAF+rMRTyN/0L+EcoinblneHQM3epzXfNr4:n5v5zUvjhDlaRlrM+rMRa8NuBKt
Malware Config
Extracted
njrat
im523
dredy
77.248.111.83:1818
fcf25ab3841a8bd745972090e983e690
-
reg_key
fcf25ab3841a8bd745972090e983e690
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ