General

  • Target

    server.exe

  • Size

    37KB

  • Sample

    220805-sp6k5sbhcq

  • MD5

    4bc8c9f0374e9e8b462ba68c3c05cbc8

  • SHA1

    d23e233c019deb218dc12656b6068ed6bb1e0f09

  • SHA256

    1caefcd78f2581528f9ffe0dd5e3832dff1d4cc72168716145d59ceb0388f000

  • SHA512

    302068d057b831233057f3fd033f7d5a4b4fabca328ac135d637fc80119a2be938681e04951734b8078ad6a08a69dc59b279d0ae94f2db844c9a37adfcdb55d5

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

positive-be.at.playit.gg:14456

Mutex

c79c8749d02e545a8c69b1379eed97c4

Attributes
  • reg_key

    c79c8749d02e545a8c69b1379eed97c4

  • splitter

    |'|'|

Targets

    • Target

      server.exe

    • Size

      37KB

    • MD5

      4bc8c9f0374e9e8b462ba68c3c05cbc8

    • SHA1

      d23e233c019deb218dc12656b6068ed6bb1e0f09

    • SHA256

      1caefcd78f2581528f9ffe0dd5e3832dff1d4cc72168716145d59ceb0388f000

    • SHA512

      302068d057b831233057f3fd033f7d5a4b4fabca328ac135d637fc80119a2be938681e04951734b8078ad6a08a69dc59b279d0ae94f2db844c9a37adfcdb55d5

    Score
    8/10
    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks