Behavioral task
behavioral1
Sample
njrat.exe
Resource
win7-20230712-en
General
-
Target
njrat.exe
-
Size
37KB
-
MD5
b67dbbab231bbbdee01a1b8065593516
-
SHA1
56032d41785075c8e28fdccf1175c8f86d7be2c4
-
SHA256
ed2003d66669252ab7181ce1479e9b0e898468b2eac1b8dc7247ec79cccdd57c
-
SHA512
abb5355c26205dd37560f73d14bb253d3f4c81dc3c2422170a5c3699230d66b1d1ae1a9d31ebe9b3c0859d13a3a5e5d55410d038c98543e203c503ab25f7cff2
-
SSDEEP
384:FxmFnqi0lJZtbH9KyM+2VzmiPZMsWerErAF+rMRTyN/0L+EcoinblneHQM3epzX+:7mSJ95M+2V6iqVe4rM+rMRa8NuWjt
Malware Config
Extracted
njrat
im523
HacKed
alshareeftwtw-28524.portmap.host:28524
924cb29f21a270d4ac8a739405d54e60
-
reg_key
924cb29f21a270d4ac8a739405d54e60
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource njrat.exe
Files
-
njrat.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ