Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20231215-en
General
-
Target
Payload.exe
-
Size
27KB
-
MD5
0715e0bb60bd88ed720819444ad5ab93
-
SHA1
256b6cbd4de6aa9d08b3d0ecc77a2b3027f0a389
-
SHA256
23e4319534f162f3bbd74fd8706d779868eb99ecec60345af6cfe52daa1a4f6b
-
SHA512
0fc5139b880408811c638775ea79fe52bfa634dc4979e1b92b4f041c06a25f8094939a5107fb0ff69c198cbf243fd3ad395f52460a6cc8ba150cf86d538b6bb8
-
SSDEEP
384:3LyNMBjmgERY/cescmGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcai6cUr6s:754sVvFA/vMHTi9bDg
Malware Config
Extracted
njrat
v2.0
HacKed
17.ip.gl.ply.gg:45753
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Payload.exe
Files
-
Payload.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ