Behavioral task
behavioral1
Sample
ac263488b03f9562a9f6144a7c1fa5403a3b61351aa33545302f8afdd52726ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac263488b03f9562a9f6144a7c1fa5403a3b61351aa33545302f8afdd52726ef.exe
Resource
win10v2004-20240412-en
General
-
Target
ce6f7c8df0dad57450740e901d08d2276e568ec5c00f0c479c9dddca68882584
-
Size
10KB
-
MD5
bdaf3aaee8d6ba4c1d8e9eb3ffe254a4
-
SHA1
51f269f15a4e742ed503c0218d2db9e2fa702dc9
-
SHA256
ce6f7c8df0dad57450740e901d08d2276e568ec5c00f0c479c9dddca68882584
-
SHA512
f7323cee5d0b474a22defa550b23cbe05e6c81c81579c81138ce4527315b3f4414200439b88f8d71738b4f4f065632bd2a7a270974a2a2243fe3686c8f2efe79
-
SSDEEP
192:XbXp6uH0+sacAt7PS2cMqwrbT4NinmO3qT8bCfKqV+hzhpPfvlNavV:XThsacACvmbTuDT8bFUKz3lNavV
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
parahoyestsidio.duckdns.org:5050
989d2a43a7
-
reg_key
989d2a43a7
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ac263488b03f9562a9f6144a7c1fa5403a3b61351aa33545302f8afdd52726ef.exe
Files
-
ce6f7c8df0dad57450740e901d08d2276e568ec5c00f0c479c9dddca68882584.zip
Password: infected
-
ac263488b03f9562a9f6144a7c1fa5403a3b61351aa33545302f8afdd52726ef.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ