Behavioral task
behavioral1
Sample
2788-12-0x0000000000400000-0x0000000000456000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2788-12-0x0000000000400000-0x0000000000456000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2788-12-0x0000000000400000-0x0000000000456000-memory.dmp
-
Size
344KB
-
MD5
e442f41fb8da37579b729d457b4f9808
-
SHA1
a955f64ac0209ea37de9c01b165dee82cbc1483d
-
SHA256
06e17d7dff96de6dafc5e427b9b98ee5fe879456708d08238e4575f43fdcd8b6
-
SHA512
f1283460711dcf20fce8071f35a68c9fd06e43a97b66892941f45b25afe6c7d021eb51bbe44e394d3cd66f16b3efaef6b06ef91d43faea5bf5a5230410cfb50c
-
SSDEEP
384:KLonRCOnujECyOwaN7E5kyxQOdvPBt+BMhAQk93vmhm7UMKmIEecKdbXTzm9bVhQ:UbAB/x5hA/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
HacKed
185.94.29.109:1111
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2788-12-0x0000000000400000-0x0000000000456000-memory.dmp
Files
-
2788-12-0x0000000000400000-0x0000000000456000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 290KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ