General
-
Target
Client.exe
-
Size
31KB
-
Sample
230603-pjc5vsgf78
-
MD5
904777d0f18496bdb0aa9e87bd42e685
-
SHA1
224478a50efd6e18bab2617a9e81c06da3a94e27
-
SHA256
7daca7d7ea3721fef0096c1d9d4d33cd6d55c7155b20be64db4fae168eb74945
-
SHA512
5d7a89caf14980a4c4dcda9078f1a9261f0b71d11456913d403d27fa86b75e09e3cc0697d12237e3560aecf75395bab102b6e87976835178f6ccd1a538c23e1b
-
SSDEEP
768:crhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti7Saj:ucZ6eh6gQVka5j
Malware Config
Extracted
njrat
0.7d
MyBot
wdex.ddns.net:8080
-
reg_key
53218de73abc0726366574c218ecf267
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
Client.exe
-
Size
31KB
-
MD5
904777d0f18496bdb0aa9e87bd42e685
-
SHA1
224478a50efd6e18bab2617a9e81c06da3a94e27
-
SHA256
7daca7d7ea3721fef0096c1d9d4d33cd6d55c7155b20be64db4fae168eb74945
-
SHA512
5d7a89caf14980a4c4dcda9078f1a9261f0b71d11456913d403d27fa86b75e09e3cc0697d12237e3560aecf75395bab102b6e87976835178f6ccd1a538c23e1b
-
SSDEEP
768:crhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti7Saj:ucZ6eh6gQVka5j
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
3Hidden Files and Directories
1Defense Evasion
Modify Registry
3File Permissions Modification
1Install Root Certificate
1Hidden Files and Directories
1