Behavioral task
behavioral1
Sample
2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N.exe
Resource
win10v2004-20241007-en
General
-
Target
2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N
-
Size
65KB
-
MD5
238a30e9eb78a74c018e0b2d602ea140
-
SHA1
ce425e2e719f1afb84f34e1a3ac6190302c414ba
-
SHA256
2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32
-
SHA512
d7faedc9814393945e052e6899f50d3cfda1812cdf499c1ab8fac449a16ae8381a70345f6e49fce421c4103bbf22cf07cf0e35da6876e19fbf23194d34048f7a
-
SSDEEP
768:jY+sNKqNHnSdRpcnuqhWYu2cbkxLuu0ycN:0+sdV+RWuq
Malware Config
Extracted
njrat
0.7d
HacKed
192.168.10.1:5552
9d253092f1a2b023ee6730bd5835421b
-
reg_key
9d253092f1a2b023ee6730bd5835421b
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N
Files
-
2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ