General

  • Target

    d128d0d459f5068dfe530367170baa007d0c020962d481d9f0cfdaf32ae5bd6d

  • Size

    37KB

  • Sample

    220520-rq7n6agcb3

  • MD5

    e8547ac392f98d01fae8e263e1b6c26b

  • SHA1

    e1cc996d8e6b31c4437c6f5ffcffdffcaaea4b46

  • SHA256

    d128d0d459f5068dfe530367170baa007d0c020962d481d9f0cfdaf32ae5bd6d

  • SHA512

    4b68a53d1be958e3aa51f938181aa8edf4d45437c79a2b933bf054a0497cacba09a7c826236dccfb657eaaa15ab2bd706b6c46f600a481df0d1a79c39d5e97f4

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

kolyasik228.ddns.net:7893

Mutex

f59597a1d3a50c6c38e895eab5af835e

Attributes
  • reg_key

    f59597a1d3a50c6c38e895eab5af835e

  • splitter

    |'|'|

Targets

    • Target

      d128d0d459f5068dfe530367170baa007d0c020962d481d9f0cfdaf32ae5bd6d

    • Size

      37KB

    • MD5

      e8547ac392f98d01fae8e263e1b6c26b

    • SHA1

      e1cc996d8e6b31c4437c6f5ffcffdffcaaea4b46

    • SHA256

      d128d0d459f5068dfe530367170baa007d0c020962d481d9f0cfdaf32ae5bd6d

    • SHA512

      4b68a53d1be958e3aa51f938181aa8edf4d45437c79a2b933bf054a0497cacba09a7c826236dccfb657eaaa15ab2bd706b6c46f600a481df0d1a79c39d5e97f4

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks