Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240708-en
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
a7b46a226d3b4e86c6d4700ed5dee333
-
SHA1
dfeaea8cbe59a1ec831aa288a1fc33639e8a7dd1
-
SHA256
fb731ca97406ae6dc235b69e8bca0d87e79f5e0a1c52f9e91f1775cea148d054
-
SHA512
3902246cba977c7dd4d74aad34a50af3250b51efe92f4010a060a3715ac3ff895a31481d18d311a1f3db5d1d248589d58a41e65d9768a95b9bb8031cab270026
-
SSDEEP
1536:ehDT8Dn+QNoB4vZ9Vk7dwmuXKDCwsNMD+XExI3pmgm:yf8Dn+nWTVk7umuXKDCwsNMD+XExI3pm
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
F9t family
japanese-cross.gl.at.ply.gg:16828
0ecb0ae2cd4872c3a8e9ee19da99e4b8
-
reg_key
0ecb0ae2cd4872c3a8e9ee19da99e4b8
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Payload.exe
Files
-
Payload.exe.exe windows:4 windows x86 arch:x86
Password: يلالب
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ