Behavioral task
behavioral1
Sample
xbd0vU3xnyOS.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
xbd0vU3xnyOS.exe
Resource
win10v2004-20230915-en
General
-
Target
xbd0vU3xnyOS.exe
-
Size
32KB
-
MD5
42213d434da48e000c97fc63ff95b95f
-
SHA1
aae5b55781424dfa669a0cd109c257195ab8e059
-
SHA256
3b3c9d324b584b4ec95400221b50e127176071e4a081c487b3b8290feac22d58
-
SHA512
2ea673f5057cee812da2905d4a355407a86e712e1f24c6b1dda159d3b4cccae5ec86997399292e3bb742c5b6a375b106b59a21b00ae66c2644eecf9b587b092b
-
SSDEEP
384:A0bUe5XB4e0XjODzw0Q0mS03AWTxtTUFQqzF4ObbV:lT9Bu6Y55dKbV
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
rusia.duckdns.org:2020
48ce43ad6d094785
-
reg_key
48ce43ad6d094785
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource xbd0vU3xnyOS.exe
Files
-
xbd0vU3xnyOS.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ