Behavioral task
behavioral1
Sample
d88a3e728153a059a398e01b451767e0fccf2eba9dcfeb6a5fe014363984a1c0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d88a3e728153a059a398e01b451767e0fccf2eba9dcfeb6a5fe014363984a1c0.exe
Resource
win10v2004-20240412-en
General
-
Target
b0eb1186dec29582d7c86d211e2addf8.bin
-
Size
10KB
-
MD5
5aac907cb7cfce694e1850298e62a29d
-
SHA1
f5416aeecde78a4b91b98c188b737d365efde9ce
-
SHA256
ae264ccf973b4181f09bc49378d688771543b5a8887bb2fc31c0b23f1af1b0d1
-
SHA512
82ebe1b51415d9bb765515f75477eb13ed0bca6451401af23d8807a451817cc2399a3a4d04a1c70bc708fa3f0c36af29a03e4f6d3cf5cd1f9d3b801761a7788f
-
SSDEEP
192:0dZkZgbRT6x/DnkLgszxH56Mpv1n7UEoZxl+nr3NRBs36vz:0wG9Omcs9gEW+nj3m3Iz
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
patria.duckdns.org:1994
03bf0f5789
-
reg_key
03bf0f5789
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d88a3e728153a059a398e01b451767e0fccf2eba9dcfeb6a5fe014363984a1c0.exe
Files
-
b0eb1186dec29582d7c86d211e2addf8.bin.zip
Password: infected
-
d88a3e728153a059a398e01b451767e0fccf2eba9dcfeb6a5fe014363984a1c0.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ