General

  • Target

    P11ayload.exe

  • Size

    27KB

  • Sample

    230406-sb8hksde66

  • MD5

    1fbe3ecaa64c7e0c8f5ef34900b5dcce

  • SHA1

    0c1956435e3e982729685643059604e4266ea946

  • SHA256

    9ea0889167f0188cc5acec10525d51426aa6dab53625267ec3be87ba898d7073

  • SHA512

    7c4118186365735d07f4cbcdf4fb98b71e31b65f2d568685760c1c63f2e759c260338b32996ad7e5fdebd0f67d69bf07a2a84f8e5fe2b3023a2b16ece0ddb334

  • SSDEEP

    384:/LZqpT2olgM3rgU225ZP7UN7zMNAQk93vmhm7UMKmIEecKdbXTzm9bVhcam6Br6s:zoIoh3HXNA/vMHTi9bD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

package-read.at.ply.gg:2072

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      P11ayload.exe

    • Size

      27KB

    • MD5

      1fbe3ecaa64c7e0c8f5ef34900b5dcce

    • SHA1

      0c1956435e3e982729685643059604e4266ea946

    • SHA256

      9ea0889167f0188cc5acec10525d51426aa6dab53625267ec3be87ba898d7073

    • SHA512

      7c4118186365735d07f4cbcdf4fb98b71e31b65f2d568685760c1c63f2e759c260338b32996ad7e5fdebd0f67d69bf07a2a84f8e5fe2b3023a2b16ece0ddb334

    • SSDEEP

      384:/LZqpT2olgM3rgU225ZP7UN7zMNAQk93vmhm7UMKmIEecKdbXTzm9bVhcam6Br6s:zoIoh3HXNA/vMHTi9bD

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks