Behavioral task
behavioral1
Sample
dfebc469780c2c152b72580384ef4d60927a6de2d1b566a1a96fe943dd3251c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfebc469780c2c152b72580384ef4d60927a6de2d1b566a1a96fe943dd3251c6.exe
Resource
win10v2004-20241007-en
General
-
Target
dfebc469780c2c152b72580384ef4d60927a6de2d1b566a1a96fe943dd3251c6.exe
-
Size
307KB
-
MD5
32db0e115ffc619b625e5bf83c87b5c0
-
SHA1
e55a1f1984f9b3f414f6f98b211ba0dee582c415
-
SHA256
dfebc469780c2c152b72580384ef4d60927a6de2d1b566a1a96fe943dd3251c6
-
SHA512
b7bcff588a4fee53ba4356b6b1d29234857bbd5e9092b5a74e4531349857f66e1ac67b5a9df9cb6416b084ab1895c98532411f3063508bd6195de261867ac13d
-
SSDEEP
3072:vnkAK3MylIIn3FIyraBOggRibieoRv8w5hhCS48:v8CIn3FIyyoJNhhCS48
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfebc469780c2c152b72580384ef4d60927a6de2d1b566a1a96fe943dd3251c6.exe
Files
-
dfebc469780c2c152b72580384ef4d60927a6de2d1b566a1a96fe943dd3251c6.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ