Behavioral task
behavioral1
Sample
bLhH.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bLhH.exe
Resource
win10v2004-20230220-en
General
-
Target
bLhH.exe
-
Size
32KB
-
MD5
be1a2f6f1e570df2f2cc2d60652c58cf
-
SHA1
5b582744ce1fe3e25240fcbfb1170316712feea8
-
SHA256
7641cfd408654206057d2f5d5af9579e28714c4d4dd92359550cebdf3c70c562
-
SHA512
9a8744c5f6efc76479deee0627e01af3a8fe0ff2b24ceae3a9aea27d021ab3a2b35516385b678f95204e3519b3ae160c54cdbb5d326782614a86d89c3bebfec0
-
SSDEEP
384:C0bUe5XB4e0XGOnjHdqlzkB8N/uWTHtTUFQqzFYrObb3f:bT9BuVrdKTybv
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
4Mekey.myftp.biz:2411
96a8c578c0954e4cb2b
-
reg_key
96a8c578c0954e4cb2b
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
bLhH.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ