General

  • Target

    85cfeed60fa9a9134684748f9ec0089d46140bb5d300f006bc6121e9ad54c178.bin

  • Size

    863KB

  • Sample

    211013-sgcyvsedh3

  • MD5

    00901973d7b977e5b42f14a629149f5b

  • SHA1

    5b8a37c6bacd8157b2f7fb0a8d737ae6e29d31cb

  • SHA256

    85cfeed60fa9a9134684748f9ec0089d46140bb5d300f006bc6121e9ad54c178

  • SHA512

    99119c74fc8b597a9817b696efcc59b05abbaa8f1c4e29a458817847bdd85040110b5413b4121b7c49d892cd123d7993969ffd8a1529befc2705169624ac3e96

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.10.10:5552

Mutex

0dc24807523d3cd24b54cd0996e4c49b

Attributes
  • reg_key

    0dc24807523d3cd24b54cd0996e4c49b

  • splitter

    |'|'|

Targets

    • Target

      85cfeed60fa9a9134684748f9ec0089d46140bb5d300f006bc6121e9ad54c178.bin

    • Size

      863KB

    • MD5

      00901973d7b977e5b42f14a629149f5b

    • SHA1

      5b8a37c6bacd8157b2f7fb0a8d737ae6e29d31cb

    • SHA256

      85cfeed60fa9a9134684748f9ec0089d46140bb5d300f006bc6121e9ad54c178

    • SHA512

      99119c74fc8b597a9817b696efcc59b05abbaa8f1c4e29a458817847bdd85040110b5413b4121b7c49d892cd123d7993969ffd8a1529befc2705169624ac3e96

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

System Information Discovery

2
T1082

Tasks