General
-
Target
RBCBankInfo.exe
-
Size
37KB
-
MD5
0eb7ff8915c28ef3f3cf6908063308f6
-
SHA1
61fe93d626da81ee20c587e6e056c807ddf2cc63
-
SHA256
385ae31a4b4d26291e79aac77c2a8cb07297042361a8d55d972fa6e66f90008e
-
SHA512
7b460d7e9b5c1b56e0fd55e688c33d84fa53db255aca8318a2088521a95075e6c9774066c00f17970df6f912b6ab9579467bfac97569144629560a486da1f047
-
SSDEEP
768:AScODnJbk/662EoT+sIPrM+rMRa8NurZt:AgnJA3voTSQ+gRJNw
Malware Config
Extracted
njrat
im523
L indian scammer ezezezez
181.ip.ply.gg:17779
ab3086702dd69aebf621a69710017e46
-
reg_key
ab3086702dd69aebf621a69710017e46
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
RBCBankInfo.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ