Behavioral task
behavioral1
Sample
192.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
192.exe
Resource
win10v2004-20230703-en
General
-
Target
192.EXE
-
Size
37KB
-
MD5
1649d31d5b1f8ddddd2b3444ef010dc7
-
SHA1
e27c641aa8aaf0786bc98f9b63af989ac996ecc5
-
SHA256
85800aa7a8c71aa0b967dcd879e495ffd8d9f40ada26754376897c07ee3e9916
-
SHA512
c05363531f1a7f7a2ec10dcf5c3b60f71dc847a5f498688b435901227ac746e0a45938af4ba50cbafc1b0b804eae8294aa5fbb356146f9c6ed3bdf0f2b0944d1
-
SSDEEP
768:WPoDQmUbCv/cP1mzMvWZVrM+rMRa8Nu4St:WADAbW0NOMOZO+gRJNP
Malware Config
Extracted
njrat
im523
HacKed
192.168.1.9:5552
3774386fac18335dbf9f53ef72d2cca6
-
reg_key
3774386fac18335dbf9f53ef72d2cca6
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 192.EXE
Files
-
192.EXE.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ