Behavioral task
behavioral1
Sample
3048-3-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3048-3-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
3048-3-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
dd059c2d9cbb4c0fd273066e6134f861
-
SHA1
30fd4bc573b5b99b607c73d38edf175527fd74d9
-
SHA256
5e5de5057327e12721f2ff4db115ebd0e0e3d17a311b274aef3f7bd3bf076175
-
SHA512
5795c14806b8031ac4a4693fd3656c8d6dd60c56b6ad5370c7ce312ef009f53c0bfb4c4965a8a425456b6ee78fc649c3e2b2efa4935d8303932147805502c03d
-
SSDEEP
384:G+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZ5h:5m+71d5XRpcnu8
Malware Config
Extracted
njrat
0.7d
HacKed
fuji9764.no-ip.biz:1177
d21c67b51e82b8bfc7a911c3083cd127
-
reg_key
d21c67b51e82b8bfc7a911c3083cd127
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3048-3-0x0000000000400000-0x000000000040C000-memory.dmp
Files
-
3048-3-0x0000000000400000-0x000000000040C000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ