Behavioral task
behavioral1
Sample
download_2.exe
Resource
win10v2004-20240611-es
General
-
Target
download_2.exe
-
Size
32KB
-
MD5
0246e26daf22440fde0953edf3f90ad6
-
SHA1
9f3fe6fd7cd19f746ddd2beebc69dfd00a8e23ef
-
SHA256
9085f329dbcbfae01a773a555db3dae06c197b2a7f6f733b82331a26ad4d46dd
-
SHA512
d133e215bf2bfbf9b89f036581db8a98d3e08622be667787d9e19d3bf890bea4319d21fa7794c2c339d3c41ff323b9c4fb6fbd67c834df961e83017e987aeddf
-
SSDEEP
384:20bUe5XB4e0XmO/GiaXLilpknDZWTltTUFQqz9pOObbB:XT9Bu19aXWl1EtbB
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
carlitosmoreno1794.duckdns.org:2019
bde06c84e1de4b23b
-
reg_key
bde06c84e1de4b23b
-
splitter
@!#&^%$
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource download_2.exe
Files
-
download_2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ