Behavioral task
behavioral1
Sample
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp
-
Size
72KB
-
MD5
1c298039c674d1243bffd7189636b229
-
SHA1
305a79eb4d2c48edc2c11765b1d6e8b418d74fef
-
SHA256
2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7
-
SHA512
174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8
-
SSDEEP
384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
abdoooo3.ddns.net:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp
Files
-
2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ