Behavioral task
behavioral1
Sample
2676-76-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2676-76-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2676-76-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
0cae0e8baef85ab082740479d465a907
-
SHA1
cbf78e79d59ce5829ee9229de13c0bf2a694565b
-
SHA256
56a166bc7a38a233413ac322c706e017e01a4cc320d848231d6f458c4c439ed5
-
SHA512
b881ea2f8576be2e1a9fdf636ed6d5750baee32410595d04a52c74fc4329f1cadb54942a8d30019b7062a27610bf9f490a53fb2c6f8e69d8cab42182599690a6
-
SSDEEP
384:zYmCsg/yJrQ7hucGSl7UJx4g6JgfCcosjddmRvR6JZlbw8hqIusZzZwN:crG0Btl7rRpcnuv
Malware Config
Extracted
njrat
0.7d
HacKed
magas69.tk:12345
3ecc8bdea77bdaf267dfb70154955bc6
-
reg_key
3ecc8bdea77bdaf267dfb70154955bc6
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2676-76-0x0000000000400000-0x000000000040C000-memory.dmp
Files
-
2676-76-0x0000000000400000-0x000000000040C000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ