Behavioral task
behavioral1
Sample
Server3.exe
Resource
win7-20240708-en
General
-
Target
Server3.exe
-
Size
93KB
-
MD5
9715c7ab9ae58bedaf49006c87eafc70
-
SHA1
f25f068460feb70e92193aa1a6352354d4f4dd31
-
SHA256
3b3abff977d8411289f5e1a9f73aea5c133055c194d4e29997e74b05fa3e0e29
-
SHA512
cdde2adddc0a4d886de6e69ad0d5259902dbad140cd43f1e732b18a7aac772ecb763cc19bbde5bf22e63edf23723fd93fa4db9cf4d4f1d7add233c5ff0dbefd3
-
SSDEEP
768:0Y3vCgyZnDQMMpAZrGSt6+tdxXYG+YcSoSVUIXxrjEtCdnl2pi1Rz4Rk3UsGdXE3:LC9ZD3rGWFtnVo4NjEwzGi1dDsxEgS
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
147.185.221.18:37615
103add70cf210fc418af47d219bacd6e
-
reg_key
103add70cf210fc418af47d219bacd6e
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Server3.exe
Files
-
Server3.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ