General

  • Target

    09a039699d3c2b826e5e2f8ad90f50fc.exe

  • Size

    37KB

  • Sample

    230324-wwfj3sge25

  • MD5

    09a039699d3c2b826e5e2f8ad90f50fc

  • SHA1

    158c98ba265e4829c203771eb566d607c5ab0f72

  • SHA256

    6c3183412fc318d586ba196d42f9399ecc84500d4624377752b4952442236093

  • SHA512

    a17c7e95fd27806da95776a81fe864e8050cbbaeb9d937ddbf2ef6dd38c88dfab5017df6706e9c1e74b51ff9ebdad22a9e78b21dcf6d8351dbba1a9c6df1d547

  • SSDEEP

    384:/0qBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3epD:M35M5jUvairANsIQxrM+rMRa8Nuu0t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

8.tcp.ngrok.io:10809

Mutex

477e42ad55ebd15287499bd5aac86f08

Attributes
  • reg_key

    477e42ad55ebd15287499bd5aac86f08

  • splitter

    |'|'|

Targets

    • Target

      09a039699d3c2b826e5e2f8ad90f50fc.exe

    • Size

      37KB

    • MD5

      09a039699d3c2b826e5e2f8ad90f50fc

    • SHA1

      158c98ba265e4829c203771eb566d607c5ab0f72

    • SHA256

      6c3183412fc318d586ba196d42f9399ecc84500d4624377752b4952442236093

    • SHA512

      a17c7e95fd27806da95776a81fe864e8050cbbaeb9d937ddbf2ef6dd38c88dfab5017df6706e9c1e74b51ff9ebdad22a9e78b21dcf6d8351dbba1a9c6df1d547

    • SSDEEP

      384:/0qBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3epD:M35M5jUvairANsIQxrM+rMRa8Nuu0t

    Score
    8/10
    • Modifies Windows Firewall

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks