General

  • Target

    d169973b1243af06c1ac39008833f37dde4a324b5718adf56b373d69f2477b69

  • Size

    37KB

  • Sample

    220520-3vepqacder

  • MD5

    3f171a70aa41a7ed35f478a8a4e7cdaf

  • SHA1

    113e61943a4b0b140fac027259157065b5d1d69e

  • SHA256

    d169973b1243af06c1ac39008833f37dde4a324b5718adf56b373d69f2477b69

  • SHA512

    ca10671ecedd2aa55aa4f299f00ee0a16c9073bff6ffd6ea17b77d62c7802f12d4fcca6750256d10257932e3d86f01415cf16765ed1fb215a6b37ca4836ce99d

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

82.202.167.194:1018

Mutex

44acb4d786c53ef4af770124b024d21e

Attributes
  • reg_key

    44acb4d786c53ef4af770124b024d21e

  • splitter

    |'|'|

Targets

    • Target

      d169973b1243af06c1ac39008833f37dde4a324b5718adf56b373d69f2477b69

    • Size

      37KB

    • MD5

      3f171a70aa41a7ed35f478a8a4e7cdaf

    • SHA1

      113e61943a4b0b140fac027259157065b5d1d69e

    • SHA256

      d169973b1243af06c1ac39008833f37dde4a324b5718adf56b373d69f2477b69

    • SHA512

      ca10671ecedd2aa55aa4f299f00ee0a16c9073bff6ffd6ea17b77d62c7802f12d4fcca6750256d10257932e3d86f01415cf16765ed1fb215a6b37ca4836ce99d

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks