Behavioral task
behavioral1
Sample
bK53.exe
Resource
win7-20230220-en
General
-
Target
bK53.exe
-
Size
23KB
-
MD5
bdc8185a8b270395984b7f63f1072107
-
SHA1
03ff66716e034bd799405fb630d3f334c62534cb
-
SHA256
502ccd94a1e7744941ab2bc6ee448107b17d026490cfdf7c02146045088efa18
-
SHA512
e019ccfe2e28c49307e7510c1f9c90b97ffe0313b1c9f18752188bcc5df1265220b28903ae4f68b7c425b8a71b47ac3d7a883722a56aca2c76044904bcb9ab68
-
SSDEEP
384:fcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZz2:E30py6vhxaRpcnuh
Malware Config
Extracted
njrat
0.7d
HacKed
0.tcp.sa.ngrok.io:16664
d8e3652b6fad72d1254b8eec8a92e129
-
reg_key
d8e3652b6fad72d1254b8eec8a92e129
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
bK53.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ