Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240221-en
General
-
Target
Server.exe
-
Size
93KB
-
MD5
f9b6ad30be032ceb2b5e39aaccafb559
-
SHA1
1727e623b758d12d165b234b3de37c23367c7fe5
-
SHA256
794e704c7eae31565db2f0474afdd29c856064d83924931f14df2a0753e78f65
-
SHA512
f5e5bf5dca7b84c28b93eda9deff5a703da1e289ee66599447fc8078764a998de15a9ecb7da2aa9d087300d6ec74cf8b870e3769cde44a691b4e9ea68764d571
-
SSDEEP
768:PY33UYSgmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82WXxrjEtCdnl2pi1Rz4Rk3c:2Ummlbrq+1NTZ0OojEwzGi1dDND4gS
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:80
80ce9eda551c4127bba4f3c5a1fc213b
-
reg_key
80ce9eda551c4127bba4f3c5a1fc213b
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Server.exe
Files
-
Server.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ