General

  • Target

    c32715c14d607191839298a5ab1e55de.exe

  • Size

    37KB

  • Sample

    230505-g92l5saf2y

  • MD5

    c32715c14d607191839298a5ab1e55de

  • SHA1

    4fbb915f8f5d752a1c79174d398d04d31d363f89

  • SHA256

    612b31c7cd1ce6c052c1eeea21645f4e45bc071c9d145c8ecd230484f16cb55b

  • SHA512

    92a3dc91bfcf669c8ab3e730d866dc0983116e5fa707901290f9cfe07b6e96604e3831a03387bf794dead2f06aeed8d313dca87708a845454b20b6ca1e5e134b

  • SSDEEP

    384:bESvEiTbTvpWNcZ0y8fvCv3v3cLkacJE0rAF+rMRTyN/0L+EcoinblneHQM3epzN:wS7TZ38fvCv3E1cprM+rMRa8Nu7dt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

5.tcp.eu.ngrok.io:11180

Mutex

168ef6f28ad1c997e1c9d23c13d45fb2

Attributes
  • reg_key

    168ef6f28ad1c997e1c9d23c13d45fb2

  • splitter

    |'|'|

Targets

    • Target

      c32715c14d607191839298a5ab1e55de.exe

    • Size

      37KB

    • MD5

      c32715c14d607191839298a5ab1e55de

    • SHA1

      4fbb915f8f5d752a1c79174d398d04d31d363f89

    • SHA256

      612b31c7cd1ce6c052c1eeea21645f4e45bc071c9d145c8ecd230484f16cb55b

    • SHA512

      92a3dc91bfcf669c8ab3e730d866dc0983116e5fa707901290f9cfe07b6e96604e3831a03387bf794dead2f06aeed8d313dca87708a845454b20b6ca1e5e134b

    • SSDEEP

      384:bESvEiTbTvpWNcZ0y8fvCv3v3cLkacJE0rAF+rMRTyN/0L+EcoinblneHQM3epzN:wS7TZ38fvCv3E1cprM+rMRa8Nu7dt

    Score
    8/10
    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks