Behavioral task
behavioral1
Sample
decode_26514e06ea4c004f478c5e5448d2009e00b23bf64e4cfc4e3021a6c0a0ce1853.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
decode_26514e06ea4c004f478c5e5448d2009e00b23bf64e4cfc4e3021a6c0a0ce1853.exe
Resource
win10v2004-20230703-en
General
-
Target
decode_26514e06ea4c004f478c5e5448d2009e00b23bf64e4cfc4e3021a6c0a0ce1853.exe
-
Size
32KB
-
MD5
ce2894675ad1697ee58f744894d6b896
-
SHA1
d62b6119a51430d9588970dceeafc19111177603
-
SHA256
49561ba535b0ace7088275850c7226178f964937f30a69455513034e5ffb9bb5
-
SHA512
9c4b8b28a374f52e874bb305f3288d2ccb8c98449cabd1d372e15955547c0c4210da3020573aaa40fef0faf06a4c2103f40b867d17f730448cd9a1a2a1cf0e0d
-
SSDEEP
384:M0bUe5XB4e0XPOdv3pixEpfnWTatTUFQqzFAObbC:ZT9BuG13pieGbC
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
deidf.duckdns.org:9993
41b3b311b404499492d
-
reg_key
41b3b311b404499492d
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource decode_26514e06ea4c004f478c5e5448d2009e00b23bf64e4cfc4e3021a6c0a0ce1853.exe
Files
-
decode_26514e06ea4c004f478c5e5448d2009e00b23bf64e4cfc4e3021a6c0a0ce1853.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ