General
-
Target
connectorV2.bin.zip
-
Size
16KB
-
MD5
79bbbf65b05a19cc21333beb2251e136
-
SHA1
1d27f1bb1a831fad35c5ab18fe994cfadda01701
-
SHA256
59c4fbd766214293d60f83021535a0158982f569a4db695d06f5659c91d6d6e5
-
SHA512
d412d0d3aaba11df32190c1e32a4942629d71d23a6d3f23db07c0aa58389ebc24ce482670a8d7957c7f35035bafa423a6f1809438adaab48196f18d4c054d0ab
-
SSDEEP
384:bj6ATc3I/IejNYYEVnhzKXA4dConq2K6swVVBB9uRSSRVn:beAGIgejNEddNCnqjkKSSRVn
Malware Config
Extracted
njrat
im523
HacKed
academic-furnishings.at.ply.gg:55855
b2fc21ad4584bfe3e6b373e29f87b355
-
reg_key
b2fc21ad4584bfe3e6b373e29f87b355
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
connectorV2.bin.zip.zip
Password: infected
-
connectorV2.bin.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ