General

  • Target

    C39E53A8A1D7E702CE379EE016E79448798ADCC9ECF57.exe

  • Size

    37KB

  • Sample

    210916-vly31adgg5

  • MD5

    4211578cdfacbd2ba17aeca89f127f60

  • SHA1

    d09bb5b348703089849fb0650c24501de5b5d388

  • SHA256

    c39e53a8a1d7e702ce379ee016e79448798adcc9ecf57854e0dffdf8e12aebd0

  • SHA512

    f248df22736ba09d85921c4be09f367dd8960b2144a875799b0ebcbf695c33d0b68eb1df3ea8ec975fd7897a6c3c200e600c3b5fe68fe9ab0bfdae3448880d7a

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

8.tcp.ngrok.io:11658

Mutex

789f05f583cf1829fbeacd099e6f1a6c

Attributes
  • reg_key

    789f05f583cf1829fbeacd099e6f1a6c

  • splitter

    |'|'|

Targets

    • Target

      C39E53A8A1D7E702CE379EE016E79448798ADCC9ECF57.exe

    • Size

      37KB

    • MD5

      4211578cdfacbd2ba17aeca89f127f60

    • SHA1

      d09bb5b348703089849fb0650c24501de5b5d388

    • SHA256

      c39e53a8a1d7e702ce379ee016e79448798adcc9ecf57854e0dffdf8e12aebd0

    • SHA512

      f248df22736ba09d85921c4be09f367dd8960b2144a875799b0ebcbf695c33d0b68eb1df3ea8ec975fd7897a6c3c200e600c3b5fe68fe9ab0bfdae3448880d7a

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks