General

  • Target

    63cedc737425f8bdf00c623c8f6dc88dfb8abb44b0a138805716166b3f323a04

  • Size

    29KB

  • Sample

    220520-fn8ynadgep

  • MD5

    e9c813c3c14c5bd4fd33874348a5669c

  • SHA1

    aebbdbf53a56e08dcbce4ac62cfebc299968a710

  • SHA256

    63cedc737425f8bdf00c623c8f6dc88dfb8abb44b0a138805716166b3f323a04

  • SHA512

    72d0ffb7cd3d24739e9627c6265ccfddbb8b7531c62ee03512bdddaac12517d10d6aa439de7b52c1f99f93c28a22a5aabab6b1d16120acbbf80e8036e86a1e58

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

INFECTED

C2

linuxhosts.ddns.net:4696

Mutex

589efcb4729236d78cc774c0c6b1714f

Attributes
  • reg_key

    589efcb4729236d78cc774c0c6b1714f

  • splitter

    |'|'|

Targets

    • Target

      63cedc737425f8bdf00c623c8f6dc88dfb8abb44b0a138805716166b3f323a04

    • Size

      29KB

    • MD5

      e9c813c3c14c5bd4fd33874348a5669c

    • SHA1

      aebbdbf53a56e08dcbce4ac62cfebc299968a710

    • SHA256

      63cedc737425f8bdf00c623c8f6dc88dfb8abb44b0a138805716166b3f323a04

    • SHA512

      72d0ffb7cd3d24739e9627c6265ccfddbb8b7531c62ee03512bdddaac12517d10d6aa439de7b52c1f99f93c28a22a5aabab6b1d16120acbbf80e8036e86a1e58

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks