Behavioral task
behavioral1
Sample
4832-164-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
4832-164-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
4832-164-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
74a387e3e423cebdd7eedc0ef7077510
-
SHA1
7e1e28e02ec95b11d2e2469a9b34e000b5484a0c
-
SHA256
c10c913e408a56256300e1a0979130a20c45b30f3899d3146df542ed17823845
-
SHA512
1be19c63451adbb40f9c97723d994fd9146447a2b6bf22e04d8cc77ad747170d29499ae88856c713bb0028606fd198140227e797ddb63574ff75faea7dfca8c5
-
SSDEEP
384:/0bUe5XB4e0X7Od+SjgkMcWTStTUFQqz9XObbG:0T9BuC8SjeChbG
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
nj0509.duckdns.org:0509
6ce9672712ba4490be
-
reg_key
6ce9672712ba4490be
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4832-164-0x0000000000400000-0x000000000040C000-memory.dmp
Files
-
4832-164-0x0000000000400000-0x000000000040C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ