General

  • Target

    4b4e6ce587df768d5f3530aa8c2a3a75.exe

  • Size

    324KB

  • Sample

    220222-kbaybaefb5

  • MD5

    4b4e6ce587df768d5f3530aa8c2a3a75

  • SHA1

    87169151f1c6b437966e5c54a683b3675d41af95

  • SHA256

    dece4adf99e29edff4ef336fe6f7c40ffb90abd46514985ef86ef7c4fe5e94ed

  • SHA512

    c060f9ce6594cfdd8043c16839bd6db65841b32288cffcec7fe21897611be76e0ae529d4668762478841d91ca6d4f74bbfbe109bb01ea3cfaaaeace1f47373db

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:7776

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |'|'|

Targets

    • Target

      4b4e6ce587df768d5f3530aa8c2a3a75.exe

    • Size

      324KB

    • MD5

      4b4e6ce587df768d5f3530aa8c2a3a75

    • SHA1

      87169151f1c6b437966e5c54a683b3675d41af95

    • SHA256

      dece4adf99e29edff4ef336fe6f7c40ffb90abd46514985ef86ef7c4fe5e94ed

    • SHA512

      c060f9ce6594cfdd8043c16839bd6db65841b32288cffcec7fe21897611be76e0ae529d4668762478841d91ca6d4f74bbfbe109bb01ea3cfaaaeace1f47373db

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks