Behavioral task
behavioral1
Sample
cbfdd5bc4b51a8f36b058a6c1946d47a3ba5c690fc25375c7e8ca370063ef488N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbfdd5bc4b51a8f36b058a6c1946d47a3ba5c690fc25375c7e8ca370063ef488N.exe
Resource
win10v2004-20241007-en
General
-
Target
cbfdd5bc4b51a8f36b058a6c1946d47a3ba5c690fc25375c7e8ca370063ef488N
-
Size
26KB
-
MD5
f299d236df394d2bc3745dc06a52ed70
-
SHA1
ca1f830972c8eff0fde21b787a69027068bbf6e4
-
SHA256
cbfdd5bc4b51a8f36b058a6c1946d47a3ba5c690fc25375c7e8ca370063ef488
-
SHA512
dc5b697a8307dd04cf8522aff6e6af748b7a57064fad21a611de68f6b8f7e27c86eb8301ceb1c06285fa03e36a450a48994cef609319360889277de380f3df45
-
SSDEEP
384:fL+M4PanO4Y7pcdYGiTOCsPodxxM2AQk93vmhm7UMKmIEecKdbXTzm9bVhcaN6U1:TG3vc7OQ2A/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
HacKed
127.0.0.1:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cbfdd5bc4b51a8f36b058a6c1946d47a3ba5c690fc25375c7e8ca370063ef488N
Files
-
cbfdd5bc4b51a8f36b058a6c1946d47a3ba5c690fc25375c7e8ca370063ef488N.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ