Behavioral task
behavioral1
Sample
a572002f055b6353b4dd9b7c0254e984a92ba73779b0bd7f3b998984c3608fa0N.exe
Resource
win7-20240903-en
General
-
Target
a572002f055b6353b4dd9b7c0254e984a92ba73779b0bd7f3b998984c3608fa0N
-
Size
3.7MB
-
MD5
c0242e57adb242ebd34b2cd1860e34e0
-
SHA1
3ce6786047bfcbcf514fb01aa9b22a24020a6cde
-
SHA256
a572002f055b6353b4dd9b7c0254e984a92ba73779b0bd7f3b998984c3608fa0
-
SHA512
15fe53ebe5082b377502b109239b7530427c8a57f0d3a3743d756bf51caeee858b05e52c11e807c88751d0505a803bbfa5217b3549405fd0b2a29b7fecf8b3b5
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98m:U6XLq/qPPslzKx/dJg1ErmNt
Malware Config
Signatures
-
Njrat family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a572002f055b6353b4dd9b7c0254e984a92ba73779b0bd7f3b998984c3608fa0N
Files
-
a572002f055b6353b4dd9b7c0254e984a92ba73779b0bd7f3b998984c3608fa0N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE