Behavioral task
behavioral1
Sample
1312-66-0x000000001AC30000-0x000000001AC3C000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1312-66-0x000000001AC30000-0x000000001AC3C000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
1312-66-0x000000001AC30000-0x000000001AC3C000-memory.dmp
-
Size
48KB
-
MD5
19751565473e0cc94b3f8bc0d6c2ace8
-
SHA1
2fd58a75283d4a76341cecb583f4322afa3ec0ae
-
SHA256
bd754a2e386774cc705ecb14094636fd6c717039d7c711b1d063ff7fa7123a09
-
SHA512
6260672fe52dd92ce58cabb6ffca057010a3167e618cafd405700c3aeb1b78fa3510ebd6475d9fb3551e338982e699d26ac02baec259b0369f0884a834f3c4e2
-
SSDEEP
384:CVLBqbft9pMiemS5Ah1XAY0rh6L03pcyzMdOJ/xJvz2jmzUM9l/Us04Ms:Yq7SkiTlo8JDvUgj/
Malware Config
Extracted
njrat
0.7d
HacKed
amazon.thedreamsop.com:2211
Microsoft® Windows® Operating System
-
reg_key
Microsoft® Windows® Operating System
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
1312-66-0x000000001AC30000-0x000000001AC3C000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ