Behavioral task
behavioral1
Sample
bUBL.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
bUBL.exe
Resource
win10v2004-20240412-en
General
-
Target
bUBL.exe
-
Size
32KB
-
MD5
c0bf09b4829bef52bac3d6fc6758ccd9
-
SHA1
964c2ee33ab5b14dafb08cf0c58e908467226487
-
SHA256
b255d7d07da3fce68de66f3b0ea1cc08931e1f2d6514a19442e51269f2277e1b
-
SHA512
929b5ca4b80115db96bc73eeb596cea902b002a8b970733d8b075c0bf0b6105dd71956f341771d3b4d5d89ccdd9ba809cb480882da87370b8f925032486cfb1c
-
SSDEEP
384:v0bUe5XB4e0XzObWiaXLilpknDNWThtTUFQqz9MBObbx:ET9BuqZaXWlBibx
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
rusia.duckdns.org:1994
f2887c56e8ee
-
reg_key
f2887c56e8ee
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bUBL.exe
Files
-
bUBL.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ