Behavioral task
behavioral1
Sample
0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397.exe
Resource
win10v2004-20230703-en
General
-
Target
0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397
-
Size
93KB
-
MD5
98925bd62fa200d17e64d6b6344d69bf
-
SHA1
144f0e9581ea6df9becf072aaa8072fc092a1c95
-
SHA256
0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397
-
SHA512
a0795697b32a6f1b772073269e737a8fc32bffa3c792c1bc011ea2253f70d29fffd103250a6f15ad7698e95ea86df22fcd7099038ca4a0e732cddc888b07fd05
-
SSDEEP
1536:pxwC+xhUa9urgOBPmNvM4jEwzGi1dDSDzgS:pxmUa9urgOkdGi1d8s
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
tcp://4.tcp.eu.ngrok.io:17346
04d43eaa62b9c649279f27f84ba0f0be
-
reg_key
04d43eaa62b9c649279f27f84ba0f0be
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397
Files
-
0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ