Behavioral task
behavioral1
Sample
d19a335a5b9e85775b76a691e2dbbdd4c85c2cc20e848a63575fbdcc18c17827.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d19a335a5b9e85775b76a691e2dbbdd4c85c2cc20e848a63575fbdcc18c17827.exe
Resource
win10v2004-20231215-en
General
-
Target
d19a335a5b9e85775b76a691e2dbbdd4c85c2cc20e848a63575fbdcc18c17827.exe
-
Size
32KB
-
MD5
ee6fb32a79683b64c335e96f462970b9
-
SHA1
017cb20f67b07b6be6e7bd6bddbf0af4e045eccd
-
SHA256
d19a335a5b9e85775b76a691e2dbbdd4c85c2cc20e848a63575fbdcc18c17827
-
SHA512
981ae0db219d0f0c1ae2fa490196607d8949d643305a04ea75805c3107a5a6ae06cbcc7176942f2a5810471db6a6d196c13bce276258ad4a3df58662cb63d0bd
-
SSDEEP
384:80bUe5XB4e0XHOnDixBr/Q6WTxtTUFQqzF8Obbt:pT9BuuDifrYN6bt
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
patria.duckdns.org:1995
37dec69be2ab4e078
-
reg_key
37dec69be2ab4e078
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d19a335a5b9e85775b76a691e2dbbdd4c85c2cc20e848a63575fbdcc18c17827.exe
Files
-
d19a335a5b9e85775b76a691e2dbbdd4c85c2cc20e848a63575fbdcc18c17827.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ