Behavioral task
behavioral1
Sample
8a429aab8c6fb77e858386f53694c6239f7088ed58ac73c25bb2969cbf87cb3a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8a429aab8c6fb77e858386f53694c6239f7088ed58ac73c25bb2969cbf87cb3a.exe
Resource
win10v2004-20230703-en
General
-
Target
57b8df6044bbfa7706f1b900216d1da0.bin
-
Size
34KB
-
MD5
7d795b43f72fea0d14469bcb36bfc950
-
SHA1
03a3613b435819ba7bd3903bc4e2310ce0d4dc7a
-
SHA256
d54cbdff24d6e37dd3179e0cf0cb3b9300f0a108c1dcf96acad227cba3328bb8
-
SHA512
4b140cdd6d018af35efb6af74ae90c1c727faca5721c7bb1b39c157dcf46d2bacee9fb64f81e253b43788d752931667314aaa8bc013557b0068193165347f8d9
-
SSDEEP
768:8/uSi6H3+S4Sa0oR/G3fmWqiNklrnBrejdq98XAn/TtFUOj+S:8/uD6H3+bSaxkvc1sLXAn/vRjL
Malware Config
Extracted
njrat
0.7d
HACKER
hakim32.ddns.net:2000
numbers-characterization.at.ply.gg:45038
ba79c07aec28b61ac839eeb4fafa3141
-
reg_key
ba79c07aec28b61ac839eeb4fafa3141
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/8a429aab8c6fb77e858386f53694c6239f7088ed58ac73c25bb2969cbf87cb3a.bin
Files
-
57b8df6044bbfa7706f1b900216d1da0.bin.zip
Password: infected
-
8a429aab8c6fb77e858386f53694c6239f7088ed58ac73c25bb2969cbf87cb3a.bin.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ