Behavioral task
behavioral1
Sample
2588-269-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2588-269-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2588-269-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
69d86ee1881b51ad90343c9510fc5236
-
SHA1
b488b678c71299379482b4054827fb42459e5749
-
SHA256
689bd10befadc6060b09e27095e78bbc664cfac011a12a4a70b5fe6d4f26c825
-
SHA512
0e3cf48900d861c1e9104488f5adfa65235980548dcdbdad2de3d83c5fba329eb3752483b5c001c315b0ebc18d65c9947e9d538f2e8d6258766058956aad5942
-
SSDEEP
384:u0bUe5XB4e0X7Od+SjgkMcWTStTUFQqz9XObbG:/T9BuC8SjeChbG
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
nj0509.duckdns.org:0509
6ce9672712ba4490be
-
reg_key
6ce9672712ba4490be
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2588-269-0x0000000000400000-0x000000000040C000-memory.dmp
Files
-
2588-269-0x0000000000400000-0x000000000040C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ