General

  • Target

    bK7G.exe

  • Size

    23KB

  • Sample

    230317-erfkvaeb77

  • MD5

    227368ebab549d28b20ce786f72320c7

  • SHA1

    50f7d115ef22a2ea3d906af5e675f416ee78b5b8

  • SHA256

    8c402138d923ed8e4403dd04010eaa9c593f42fc02c5fa349774c44d8dda006e

  • SHA512

    9fd1d82ba2c09c23280ab00cf99790d2c66d1c4e1ebed32b6e8f5ab5f27814d95c800b18da216656b536f3f0cb1c069a29ada8ec46c6a8805e9dc2a630651f39

  • SSDEEP

    384:0oWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMQ:j7O89pbrRpcnui

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

0.tcp.ngrok.io:17506

Mutex

db4fd7d140aa221059113328d0539f84

Attributes
  • reg_key

    db4fd7d140aa221059113328d0539f84

  • splitter

    |'|'|

Targets

    • Target

      bK7G.exe

    • Size

      23KB

    • MD5

      227368ebab549d28b20ce786f72320c7

    • SHA1

      50f7d115ef22a2ea3d906af5e675f416ee78b5b8

    • SHA256

      8c402138d923ed8e4403dd04010eaa9c593f42fc02c5fa349774c44d8dda006e

    • SHA512

      9fd1d82ba2c09c23280ab00cf99790d2c66d1c4e1ebed32b6e8f5ab5f27814d95c800b18da216656b536f3f0cb1c069a29ada8ec46c6a8805e9dc2a630651f39

    • SSDEEP

      384:0oWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMQ:j7O89pbrRpcnui

    Score
    8/10
    • Modifies Windows Firewall

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks