Malicious
Malicious

ID:0

PE Executable
|
MD5: 83b3e47f5dab95b828610a96917e2c9f
|
Size: 56.32 KB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
83b3e47f5dab95b828610a96917e2c9f
Sha1
74dd7a20b6aecbf9df11c2d6fe9f13b5bd57f429
Sha256
585f182fccf58a52584664fd66c58c080951f9deef4bed4fd772226e8f524ec8
Sha384
b1ac3489a0f91d77fb83d89828ab51b01b2578fb061ccdd8637518969a9e7fc56c5353a5ce91b3ec503087e433caef5e
Sha512
bd625415e1a0f6602ebf5f1ad40335a159939fad0f7908001232f2690b1870e7e188604b8e8f95d8efd8a0c3416ae53d188382ff6d26f4fc3268c246b3fb0191
SSDeep
1536:OQCUbsDnyNho6JypySDxwsNMDfXExI3pmMm:NCEsDn4o6I4SDxwsNMDfXExI3pm
TLSH
53431740BFEA4A05E2BD8F3468F645150634BA63E632EB1E4CD668DB17327C58C40FE6

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - njRAT config.
Config. Field
Value
packet_size [b]

5121

BD [BD]

False

directory [DR]

TEMP

executable_name [EXE]

dllhost.exe

cnc_host [H]

yohlkdt3m.localto.net

is_dir_defined [Idr]

False

Anti_CH

False

is_startup_folder [IsF]

False

USB_SP

False

is_user_reg [Isu]

False

cnc_port [P]

6677

reg_key [RG]

45eda18d441c7819839790de86984f4f

reg_path [sf]

Software\Microsoft\Windows\CurrentVersion\Run

victim_name [VN]

Nigga

version [VR]

<- NjRAT 0.7d Horror Edition ->

splitter [Y]

Y262SUCZ4UJJ

MSGE

Disabled

MSGT

Themida

MSGB

Sorry, this application cannot run under a Virtual Machine

MSGSYM

vbCritical

OBITO

Disabled

TSKE

Disabled

TSK

Wireshark.exe

KAKASHI

Disabled

AKATSUKI

Disabled

CLEANSWEEP

Disabled

PASTEE

Disabled

PASTEBIN

https://pastebin.com/raw/???

CLIP

null

UAC

Disabled

nowifi

off

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void j.A::main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

539

Main Method

System.Void j.A::main()

Main IL Instruction Count

2

Main IL

call System.Void j.OK::ko() ret <null>

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void j.A::main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

539

Main Method

System.Void j.A::main()

Main IL Instruction Count

2

Main IL

call System.Void j.OK::ko() ret <null>

Artefacts
Name
Value
CnC

yohlkdt3m.localto.net

Port

6677

ID:0 (56.32 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙