General

  • Target

    cf5842ccd42db3f8dd67df5c6dfc6dded85ad75f402751be3c4e9e5f29e58103

  • Size

    31KB

  • Sample

    220523-z4sq6acack

  • MD5

    cf1e69d75b4678bd30ba449401dbea51

  • SHA1

    7db96a0029285e73993190f165b6ce31c9ec6a2a

  • SHA256

    cf5842ccd42db3f8dd67df5c6dfc6dded85ad75f402751be3c4e9e5f29e58103

  • SHA512

    593e567aadb4f90fd120d1ff768f23db9e3a310ad5861c897802866fbeb0c841479b1285d8282756f4179d6b4d208d0d70a00c6eae256099263041837e6d42ad

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Bot

C2

127.0.0.1:6522

Mutex

e0bc912040dccb7aa777799ab687565b

Attributes
  • reg_key

    e0bc912040dccb7aa777799ab687565b

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      cf5842ccd42db3f8dd67df5c6dfc6dded85ad75f402751be3c4e9e5f29e58103

    • Size

      31KB

    • MD5

      cf1e69d75b4678bd30ba449401dbea51

    • SHA1

      7db96a0029285e73993190f165b6ce31c9ec6a2a

    • SHA256

      cf5842ccd42db3f8dd67df5c6dfc6dded85ad75f402751be3c4e9e5f29e58103

    • SHA512

      593e567aadb4f90fd120d1ff768f23db9e3a310ad5861c897802866fbeb0c841479b1285d8282756f4179d6b4d208d0d70a00c6eae256099263041837e6d42ad

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks