Behavioral task
behavioral1
Sample
db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe
Resource
win10v2004-20241007-en
General
-
Target
db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe
-
Size
93KB
-
MD5
d61320e11b78f4c54887b55d238ad600
-
SHA1
c11c3eb0b94909897081e0d5bb8bc1656376afd1
-
SHA256
db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03
-
SHA512
a1b20825856517613ebc99b4b1d80b34c05e26c8cba8db6a0707cc08329e05af6243e1b4ec1511e46c1fae8b595d78d2c7ed698fb5ec6ec303b54e35a24badf4
-
SSDEEP
1536:s4UpR8lZc+/2HK1j+fTd5jEwzGi1dDWD5gS:s4UpKc+/2HK1oTdWi1dQ2
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
78.156.229.8:7777
31a76954e6446acb903929bf0d0d71d9
-
reg_key
31a76954e6446acb903929bf0d0d71d9
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe
Files
-
db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ