Behavioral task
behavioral1
Sample
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8.exe
Resource
win10v2004-20230831-en
General
-
Target
735e2ebea2304cd996ade02f9f62383a_JC.bin
-
Size
35KB
-
MD5
78d2001bcb3637b53a2e02feaef37eb6
-
SHA1
90c67f5125798634d9418f19e8819be2648fa1f1
-
SHA256
3e4648162fac938f44973f7270b3238c2081cf833a368ee029eb3384ba8a4cf0
-
SHA512
b6fa81af37dc06d738f524fe6ae6ec7c430f7462889cd1f7810de329a89975361499466b550107291c714d20607aca731194e82db33a63f63776c77a60724b6c
-
SSDEEP
768:OmL04AwrVjBux+OEF/gE9jol5pFRlS5EACD5QYs4J/lnJEQQn4kgFQrubpwV1:hI4jrOEb9jol5pvDJJ/ROQQ4kgXbmz
Malware Config
Extracted
njrat
0.7.3
Lime
gremabenj.duckdns.org:9600
Client.exe
-
reg_key
Client.exe
-
splitter
8520
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8.exe
Files
-
735e2ebea2304cd996ade02f9f62383a_JC.bin.zip
Password: infected
-
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ