Behavioral task
behavioral1
Sample
7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b.exe
Resource
win10v2004-20230915-en
General
-
Target
7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b
-
Size
27KB
-
MD5
6a25c8bec6ee34d0e78446c4ed79ec54
-
SHA1
d0aadfc3d23f56209bc11b7b1753b5cb7996725e
-
SHA256
7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b
-
SHA512
3ba628540e4f473e6c554715669a67be6ec23348723329824a38ab1c0b2163a681277b67ce9de80cc8385d5597728c8f5e8c1294c448c242a4a045b9a052a6ad
-
SSDEEP
384:FL8kWj/+AU9878FtoexuaP39hRnMZAQk93vmhm7UMKmIEecKdbXTzm9bVhcaO6l1:FJcmsoXttyZA/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
HacKed
0.tcp.in.ngrok.io:14104
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b
Files
-
7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ