Behavioral task
behavioral1
Sample
10e012b7d6d88eba23bc9ba0ae4ee9cb299a1f688fb8ccac9c1f03319e0a7575.exe
Resource
win7-20240221-en
General
-
Target
10e012b7d6d88eba23bc9ba0ae4ee9cb299a1f688fb8ccac9c1f03319e0a7575.exe
-
Size
93KB
-
MD5
701061274a68a71561cf2ec0a1332635
-
SHA1
f83da28647230602bb88461341a052bef651cbd5
-
SHA256
10e012b7d6d88eba23bc9ba0ae4ee9cb299a1f688fb8ccac9c1f03319e0a7575
-
SHA512
ed5fc6fe6b82fefeb943c1cb20fdac7e01d43784a3cbd4fe88f7ea5cebe014609585ee354b3382ed822969f8ba453b9fa8b197acd2f110a664e6ff65e1412d7f
-
SSDEEP
1536:MI4JD/HBZbszKu9AZpE7r1jEwzGi1dDoDjgS:MI3zK4AZCHCi1d+c
Malware Config
Extracted
njrat
0.7d
Hacked
hakim32.ddns.net:2000
45.142.182.104:4568
8176ddd3532710782091cb4edeb4cd62
-
reg_key
8176ddd3532710782091cb4edeb4cd62
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10e012b7d6d88eba23bc9ba0ae4ee9cb299a1f688fb8ccac9c1f03319e0a7575.exe
Files
-
10e012b7d6d88eba23bc9ba0ae4ee9cb299a1f688fb8ccac9c1f03319e0a7575.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ