General

  • Target

    69238e764b832443cd82c2b523f23c68d1ec7fdd1cb16e968efebd12fd75debc

  • Size

    29KB

  • Sample

    221126-klpt8aab21

  • MD5

    236fa756b03f2fe1e98a3ba595efed9c

  • SHA1

    bc7ed1323a8c1b251ec379efc59bf127324a1334

  • SHA256

    69238e764b832443cd82c2b523f23c68d1ec7fdd1cb16e968efebd12fd75debc

  • SHA512

    4edb69785fbd73d1140a1baaef0e1892e8bb484db3fb44622d73bdf751469d6858361837ae82c258711009d058308abb1aed9f246fce1be01e526a1cc686fb44

  • SSDEEP

    384:wXgJGJl7tj1MsagaRj5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOZl:wv7nMsanBR+2cqEDveyBKh0p29SgRBr

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

ilovetohack.ddns.net:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      69238e764b832443cd82c2b523f23c68d1ec7fdd1cb16e968efebd12fd75debc

    • Size

      29KB

    • MD5

      236fa756b03f2fe1e98a3ba595efed9c

    • SHA1

      bc7ed1323a8c1b251ec379efc59bf127324a1334

    • SHA256

      69238e764b832443cd82c2b523f23c68d1ec7fdd1cb16e968efebd12fd75debc

    • SHA512

      4edb69785fbd73d1140a1baaef0e1892e8bb484db3fb44622d73bdf751469d6858361837ae82c258711009d058308abb1aed9f246fce1be01e526a1cc686fb44

    • SSDEEP

      384:wXgJGJl7tj1MsagaRj5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOZl:wv7nMsanBR+2cqEDveyBKh0p29SgRBr

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks