Behavioral task
behavioral1
Sample
296-135-0x0000000000D10000-0x000000000108E000-memory.exe
Resource
win7-20240221-en
General
-
Target
296-135-0x0000000000D10000-0x000000000108E000-memory.dmp
-
Size
3.5MB
-
MD5
16bf093cfc5a66fa3f045c76695f598f
-
SHA1
e52e016e54a09d426c42d4534cb9731277476404
-
SHA256
ab5476bb26206f6cee777450aeb970b8f0dda25f09c55151d876b44431d2db50
-
SHA512
c25b9990e5b120808b7be4cd193757f7e280b827c2caa07dc0f1a77e22c9f96b15e6ac97c98af73036bac2cd4fd6db527b1849137f72dfcffdf7011063f35654
-
SSDEEP
49152:IiZbAtRZRpPco3TjIk5m646mdXIHMbeeCoP/QoPDz/nK9E4UX:txAtRZzB3IBBOsbeeCS/5z/nK9E4
Malware Config
Extracted
njrat
hakim32.ddns.net:2000
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 296-135-0x0000000000D10000-0x000000000108E000-memory.dmp
Files
-
296-135-0x0000000000D10000-0x000000000108E000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
$re45gr Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ