Analysis
-
max time kernel
8s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2023, 11:38
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
Server.exe
-
Size
43KB
-
MD5
621e4e49b03c78b3d7e5f3009d30ca7e
-
SHA1
2c61e1935a571f299824c9014801dbedaa54f280
-
SHA256
2c0033a6f0d9b0c8f0127ae6c7615b81acef43fef4f89bf89b9e329e7fdf9fb2
-
SHA512
d91d03eb4896f35fd16ff249050461c732974c8bbfd608b4859258e0cde9c84ba4f8d7c11cefb611837ad32820d1d572fead2653ec50598cf9f2dff8208f9072
-
SSDEEP
384:qZy0lO1STss7yKSxVYkEgEkurJS2dzsIij+ZsNO3PlpJKkkjh/TzF7pWnm/greTf:oHIk4smKSHYZxrEYuXQ/o/3+L
Score
10/10
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
7.tcp.eu.ngrok.io:7777
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe