Behavioral task
behavioral1
Sample
2680-272-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
2680-272-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2680-272-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
ffec0812ddb38490668c57d35e29f246
-
SHA1
fc509ac4c83403cc0b1166ecb74d93ccdefa68ce
-
SHA256
7ea45afd8efeada90ce6c2bc9fbd03979576c2fe511dd4e8f2f5e805c9c53901
-
SHA512
1700377a4848aa96cd4e989a28246cf150a08ac6895164698172f52454020a0901e00f40ca79fafffee2c0938bb25961de9adc550a698fe288eff4607292ae9b
-
SSDEEP
384:+0bUe5XB4e0X7Od+SjgkMcWTStTUFQqz9XObbG:vT9BuC8SjeChbG
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
nj0509.duckdns.org:0509
6ce9672712ba4490be
-
reg_key
6ce9672712ba4490be
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2680-272-0x0000000000400000-0x000000000040C000-memory.dmp
Files
-
2680-272-0x0000000000400000-0x000000000040C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ