Behavioral task
behavioral1
Sample
bSMK.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bSMK.exe
Resource
win10v2004-20231215-en
General
-
Target
bSMK.exe
-
Size
32KB
-
MD5
9a72b511b1fd2078683373002076714c
-
SHA1
9a3f1bbfea7cadf1dfbfc9db2496407ae39527d0
-
SHA256
086f335efce2f5cc6171e0d707fa659e1db7b282195df9bf28c054a01337f8a1
-
SHA512
6791acc4556a673e573b07a050d5c49e49599d3bd688fced70daaed776d6b048f2343d9e76e41890ed79ec50a7270b13a7ba4b0cf1f19f090c8f273ef010bbc0
-
SSDEEP
384:M0bUe5XB4e0X7ObGANuiEO0YadWTitTUFQqzFMObb6:ZT9BuC6guiEYqOb6
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
pradera.duckdns.org:2054
559b0f250b
-
reg_key
559b0f250b
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bSMK.exe
Files
-
bSMK.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ