Behavioral task
behavioral1
Sample
1472-56-0x0000000000250000-0x000000000025C000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1472-56-0x0000000000250000-0x000000000025C000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1472-56-0x0000000000250000-0x000000000025C000-memory.dmp
-
Size
48KB
-
MD5
eab74f1d824920aae856d3d2be7fb3ff
-
SHA1
8ede1398281c8cc10fcaa74948672cd306708c05
-
SHA256
0b7224dd4058c84a060c06a131d705d645f80cdda82a57b2b0605cae056a47ac
-
SHA512
38f807709ee07caae4caeccaee5bdea518bf71aa8237161bd01ff15acdf1cc05ab4b856ff5271d718225ab8e0292a6df90c484326efb590f7dbc1403f93f2561
-
SSDEEP
384:629qHfDJBecNTlK9ShQh9XEAys7dG3ELZoyzMdOJ/xJPz2jmzUM9l/Us0nMs:tq//TA9SUr19o8JDPUgjc
Malware Config
Extracted
njrat
0.7d
HacKed
ebay.thedreamsop.com:1010
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
1472-56-0x0000000000250000-0x000000000025C000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ