Behavioral task
behavioral1
Sample
3068-18-0x00000000002E0000-0x00000000002EC000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3068-18-0x00000000002E0000-0x00000000002EC000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
3068-18-0x00000000002E0000-0x00000000002EC000-memory.dmp
-
Size
48KB
-
MD5
d7bb984bcbeaaf2873aea2bce3a36073
-
SHA1
f3cc4c1f1958ad809396bc00945d10b5c4968ec7
-
SHA256
3f0dcf0987034aacac24fbc428045c6e531240053f4027417abb0fa57626e5da
-
SHA512
ac7fa655f2ece9fd17fbb50a03e0154619c67c91b01dfe3eabb1ee80ce50db391aa8974167899a4bda264fc6773102e2103ca45bcb867be903a8da2fd6010ad7
-
SSDEEP
384:mluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZhnJ:JOmhtIiRpcnuqJ
Malware Config
Extracted
njrat
0.7d
Pro-SYstem
x555hd.ddns.net:555
9e82a5ccaed752a57fda004b4018de61
-
reg_key
9e82a5ccaed752a57fda004b4018de61
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3068-18-0x00000000002E0000-0x00000000002EC000-memory.dmp
Files
-
3068-18-0x00000000002E0000-0x00000000002EC000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ