Behavioral task
behavioral1
Sample
Njrat .204.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Njrat .204.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Njrat .204.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Njrat .204.rar
-
Size
125KB
-
MD5
2f8f859411fbf35a8e0c0c220a88285e
-
SHA1
ebc9bbd7e4819f60e786ced2f1aaa4875cd33478
-
SHA256
6d6c3ea3e134ca6775cf2be8c7246fc63f68bb7a594650d0c4b8f22a74093d4b
-
SHA512
63ee1d295cdb3d9cd3b0e81850a9ae6eb7b3d0b2924038127a24fef82c6ecbcfe3eb820dd7ef923a710f3759d1321a9c5086535b2e6624577c47fee98d1b8992
-
SSDEEP
3072:TuhsGEF1fTmqDufpkBoB6ESC5WjjoLPSfPdg98xiokf:TmKfT3yhkG+jESfPlvkf
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1301608203133648926/or1AA5-Ux8B1-TMLBh30Bf71iffcB8WRSlayVtmgP4S0TVOddJmrwT00Sg1XUYIByEJT
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule static1/unpack001/Njrat .204.exe family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Njrat .204.exe
Files
-
Njrat .204.rar.rar
-
Njrat .204.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ