Behavioral task
behavioral1
Sample
1564-3-0x0000000000880000-0x000000000088C000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1564-3-0x0000000000880000-0x000000000088C000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1564-3-0x0000000000880000-0x000000000088C000-memory.dmp
-
Size
48KB
-
MD5
00bede03147d9aed0386c7fe69b3ac1c
-
SHA1
2aa61fb1b2d6e9f371c3fa8fc97fd7dcb64a7f5f
-
SHA256
caffc990b18133478cd266593351c4a8a39e4c32e868732d0e786a738a94846b
-
SHA512
6b10b02f2a5541a134d9cd5cac425a6fb84ee3a3edbbfbcb59f9e40e15ce63bbce04fd955028f7270d5fec8cc92d5c1fee7347cfb18286b7b93704dff8f51d7b
-
SSDEEP
384:X0bUe5XB4e0XHOnNIQgYbr9pfWTotTUFQqz9cObbPwm:8T9BuuNIQVbJjKbPwm
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
milla.publicvm.com:5050
c2d7435e0d60496d8
-
reg_key
c2d7435e0d60496d8
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1564-3-0x0000000000880000-0x000000000088C000-memory.dmp
Files
-
1564-3-0x0000000000880000-0x000000000088C000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ