General

  • Target

    535644d4ec58e7f01017b11b2f446627.exe

  • Size

    37KB

  • Sample

    230317-ztvsrsca5y

  • MD5

    535644d4ec58e7f01017b11b2f446627

  • SHA1

    d47ee3cbedecc205f048c0ab58921eec35343c45

  • SHA256

    9b21553d8024ff5bd5a445d3c8b1bb0943566ae89754f7b2aec383b9531ddce6

  • SHA512

    265aa2d3f3cc659246a4b16737c9dd9456ffe92cfaf32f330f90963bfd2a9fd6ec90e4e60dea830e6b56851542966d9869e7a96fbdd6036d1e4b9d5b97e3b3d4

  • SSDEEP

    384:Xpick7sgwi+tx3+j/NSyszg8QPBI3mmbNrAF+rMRTyN/0L+EcoinblneHQM3epzQ:55kQLCNhszg8QeWmZrM+rMRa8NuDOt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

147.50.253.218:5552

Mutex

ad4f96bb884910c0e87ac753a493adeb

Attributes
  • reg_key

    ad4f96bb884910c0e87ac753a493adeb

  • splitter

    |'|'|

Targets

    • Target

      535644d4ec58e7f01017b11b2f446627.exe

    • Size

      37KB

    • MD5

      535644d4ec58e7f01017b11b2f446627

    • SHA1

      d47ee3cbedecc205f048c0ab58921eec35343c45

    • SHA256

      9b21553d8024ff5bd5a445d3c8b1bb0943566ae89754f7b2aec383b9531ddce6

    • SHA512

      265aa2d3f3cc659246a4b16737c9dd9456ffe92cfaf32f330f90963bfd2a9fd6ec90e4e60dea830e6b56851542966d9869e7a96fbdd6036d1e4b9d5b97e3b3d4

    • SSDEEP

      384:Xpick7sgwi+tx3+j/NSyszg8QPBI3mmbNrAF+rMRTyN/0L+EcoinblneHQM3epzQ:55kQLCNhszg8QeWmZrM+rMRa8NuDOt

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks