General
-
Target
Server (1).exe
-
Size
93KB
-
MD5
17fad1309e42de8a6f4b866d09c414eb
-
SHA1
0496851effef304f121111d9aae7e3154b2556bb
-
SHA256
a61ece0fc679c88ec5c41aa004befb938feb72d7eee078fe6adb7621dbf9aa6c
-
SHA512
cecc93bcf7fda98c9eb6e429be6ce4d184d02f130b1d42c9b3b7b570fca024a3b6164b0c70c7b626362fe7e4533349e49f157b2ef76b963727ea709923971c14
-
SSDEEP
1536:1GbJD/HBZbszKu9AZpd7r1jEwzGi1dDpD6gS:1GqzK4AZ3HCi1dt/
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
94.131.109.101:5552
aa276fc1974312c54b828f06233901ca
-
reg_key
aa276fc1974312c54b828f06233901ca
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Server (1).exe
Files
-
Server (1).exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ