Behavioral task
behavioral1
Sample
d11cc7508d420994e19a1df2327d313303117948b62d386b00d8120e17666be7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d11cc7508d420994e19a1df2327d313303117948b62d386b00d8120e17666be7.exe
Resource
win10v2004-20230220-en
General
-
Target
d11cc7508d420994e19a1df2327d313303117948b62d386b00d8120e17666be7.zip
-
Size
25KB
-
MD5
c969f7169b9211a95d44bbe5d04fc5ae
-
SHA1
d4c160dc007b7afbf8039bcaffee804b6c909364
-
SHA256
aace35ba090a02c5c4710c9b07b7d8e761d10c31326a9ba06a2a9b77d5a6d13a
-
SHA512
27890cb55e2a08d2b42b246d1b232d05de16fd07c6268147cd213259517e84941de9b3b3321f0ed9efcbc84a8a57d6f3da73222bffa2552683ccafa7dfaaf08e
-
SSDEEP
768:Y5gTQtOk0jAnLr1cwxLv1yKWvuVu25mSp2:PTcz0jmn1cwdYVGVnmx
Malware Config
Extracted
njrat
Crypters
NYAN CAT
0.tcp.sa.ngrok.io:12257
00363c7d18814191
-
reg_key
00363c7d18814191
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
d11cc7508d420994e19a1df2327d313303117948b62d386b00d8120e17666be7.zip.zip
Password: infected
-
d11cc7508d420994e19a1df2327d313303117948b62d386b00d8120e17666be7.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ