General

  • Target

    h.exe

  • Size

    37KB

  • Sample

    230322-redxpsbb2w

  • MD5

    629c0dfd3a9b0377cfe5f04629dc6b7f

  • SHA1

    c4f7e46c7d2c6ee69d0747874a3a215101931751

  • SHA256

    8026b74f56f884cf8aa106f6263dafdcad5b2bd8b458578aea30cc397e0de7c1

  • SHA512

    4cf763c2b324bbf06fad474816fd8452c8917066c9f5e46bb852a6bb7f3951c1d7fa9c60a874de3f2c367b20b8dd3845a00811ba6ca9c55e67fa8610fa2367af

  • SSDEEP

    384:DeLx1kit8Zf5W9cTYXyc/bBM0izvncnPMIurAF+rMRTyN/0L+EcoinblneHQM3ei:CLxKjjTYic/be0PM/rM+rMRa8NuH2t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

8.tcp.ngrok.io:14795

Mutex

14406cec1182ad14ed430e1c303f1c84

Attributes
  • reg_key

    14406cec1182ad14ed430e1c303f1c84

  • splitter

    |'|'|

Targets

    • Target

      h.exe

    • Size

      37KB

    • MD5

      629c0dfd3a9b0377cfe5f04629dc6b7f

    • SHA1

      c4f7e46c7d2c6ee69d0747874a3a215101931751

    • SHA256

      8026b74f56f884cf8aa106f6263dafdcad5b2bd8b458578aea30cc397e0de7c1

    • SHA512

      4cf763c2b324bbf06fad474816fd8452c8917066c9f5e46bb852a6bb7f3951c1d7fa9c60a874de3f2c367b20b8dd3845a00811ba6ca9c55e67fa8610fa2367af

    • SSDEEP

      384:DeLx1kit8Zf5W9cTYXyc/bBM0izvncnPMIurAF+rMRTyN/0L+EcoinblneHQM3ei:CLxKjjTYic/be0PM/rM+rMRa8NuH2t

    Score
    8/10
    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Command and Control

Web Service

1
T1102

Tasks