Behavioral task
behavioral1
Sample
40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113.exe
Resource
win10v2004-20230915-en
General
-
Target
3947a0556c4159f49b9a7f9d23e2b4f5.bin
-
Size
10KB
-
MD5
7758f7de7c2223a5ca1dbe86067a55d0
-
SHA1
1b8a0f725298ac7c12ad71206770f76205c25b36
-
SHA256
ec96711139ec3c09b117ef0120db0647ec1361a3acde00eee03941cf7da024ae
-
SHA512
18b29b89a89fe4f3c4b41f94fae5e7df250e6c9c5862093c56f7133a739adf680180428e99f0e15f5ff3e39cafe9f60b74561011fad4cd7c9462ab2a4b75fc66
-
SSDEEP
192:vY0+mTgm5RJMZTieXeQC5iyDp7YOWvFuW1ttEXNuiETqZ2YpLz/44r:vYugsJMZTi4eQkpEFf32uiEs2YpX/hr
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
1.tcp.sa.ngrok.io:21422
375c01c17d154679
-
reg_key
375c01c17d154679
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113.exe
Files
-
3947a0556c4159f49b9a7f9d23e2b4f5.bin.zip
Password: infected
-
40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113.exe.exe windows:4 windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ