Behavioral task
behavioral1
Sample
a89946e9a909b4f13fade2c8a9e42e715877d6cb84e6a43b452c8c38c7d417c3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a89946e9a909b4f13fade2c8a9e42e715877d6cb84e6a43b452c8c38c7d417c3.exe
Resource
win10v2004-20230220-en
General
-
Target
7562b582d48f0c92e2ab4d4ca127f529.bin
-
Size
10KB
-
MD5
45a27529ed534b6258e722f180d1a380
-
SHA1
4d2afae292626266b723a831bbcfe9c9daf3f2c9
-
SHA256
562d4f56c0db88ef2a2885d40d1db13035e1385d335a63472c07ab468f2d9799
-
SHA512
2199f0b31fd59fca52a5506bc9d9a78f47b2ad1323fc0d23565dd8b28ec9881b814f0ae0d1bac10d314a25ae1520204f3fdabac4cc7ee7868ff1ca15f9496200
-
SSDEEP
192:FEgGVMKNFn3JejWLN4gc/FOLkDbEJAvwgy6UVp+6OogZjuojDnJ:FEgGZNZ5eyLN4h/FoKvwD+RpXnJ
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
0.tcp.sa.ngrok.io:14921
6c20a4bef3
-
reg_key
6c20a4bef3
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
7562b582d48f0c92e2ab4d4ca127f529.bin.zip
Password: infected
-
a89946e9a909b4f13fade2c8a9e42e715877d6cb84e6a43b452c8c38c7d417c3.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ