General

  • Target

    Server.exe

  • Size

    37KB

  • Sample

    220621-q9te7sgbc4

  • MD5

    f09a20fdffb51a09759ef49bad16573e

  • SHA1

    a435202e700dadf18f2055697f01e4c13287f724

  • SHA256

    107435bf08485e16d781f4bb0e012cc23a3b1573ea508212d9c0ae21d5e2537e

  • SHA512

    1c0f8480d6d9fd27eebf2ac8c60befe9fafadff466f9d17bfb268a3fcf652ffb89aacb0077e300be1562cd5046155745c499945c3da80c1b7f5e0bf88cc23ae8

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

gay

C2

4.tcp.eu.ngrok.io:11077

Mutex

8d2ae8f00af88e22d2e1fbf05a792210

Attributes
  • reg_key

    8d2ae8f00af88e22d2e1fbf05a792210

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      37KB

    • MD5

      f09a20fdffb51a09759ef49bad16573e

    • SHA1

      a435202e700dadf18f2055697f01e4c13287f724

    • SHA256

      107435bf08485e16d781f4bb0e012cc23a3b1573ea508212d9c0ae21d5e2537e

    • SHA512

      1c0f8480d6d9fd27eebf2ac8c60befe9fafadff466f9d17bfb268a3fcf652ffb89aacb0077e300be1562cd5046155745c499945c3da80c1b7f5e0bf88cc23ae8

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks