Behavioral task
behavioral1
Sample
Server.exe
Resource
win10v2004-20240508-en
General
-
Target
Server.exe
-
Size
37KB
-
MD5
dc76d82653fb0ab4f222c0cde02b0f05
-
SHA1
c4a5346068f7b4bf2031695811bd9b68dc823162
-
SHA256
40382cde5781500679fb27358962ac6b025807d50ddd622963fa4ab11ae363f2
-
SHA512
12bd6e6957d2a83996bca4574261ad777a2b92b2716a0dfbc10965f78f9f0bdbf3a3bb9d4cb6d88a02417a141b610425b5e5df0816e8cd6a12c4d43afed10407
-
SSDEEP
384:1OZZDj6iclri5Z7JAyk/m4uvBxZeaaFMrAF+rMRTyN/0L+EcoinblneHQM3epzXC:IZLHJ7k/m4ubZrairM+rMRa8NuDMt
Malware Config
Extracted
njrat
im523
Pidrila
tcp://0.tcp.eu.ngrok.io:12876:5552
ef95f74e8d0bd0ab5ea351a976a7cb09
-
reg_key
ef95f74e8d0bd0ab5ea351a976a7cb09
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Server.exe
Files
-
Server.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ