General

  • Target

    Server.exe

  • Size

    37KB

  • Sample

    230625-nh3tfsdh22

  • MD5

    0ceb4f5cf4dde9a4641c6575f78f72ab

  • SHA1

    eb9f46fc0fafd4fd80321444ce642529366534de

  • SHA256

    d9be23f04b3af31b16247e792983bd73bf6016c05822614afe545b9f7c291a79

  • SHA512

    3f08b4c2f6b7c4c76f27b73a0e1ac911352c70ebd26b13da11ef64591bd3111b9d253f466815d89960c3bf103afb0d5d9561237a1d250593521355babd87915e

  • SSDEEP

    384:sNQCT0i9HdTe/kCOyU73oflQDXSikrAF+rMRTyN/0L+EcoinblneHQM3epzXqNrJ:yVt1CFU73oSDSPrM+rMRa8NuA9t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

BOT

C2

4.tcp.eu.ngrok.io:18513

Mutex

34c94d9c82c8d0957f3390d81057eaa8

Attributes
  • reg_key

    34c94d9c82c8d0957f3390d81057eaa8

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      37KB

    • MD5

      0ceb4f5cf4dde9a4641c6575f78f72ab

    • SHA1

      eb9f46fc0fafd4fd80321444ce642529366534de

    • SHA256

      d9be23f04b3af31b16247e792983bd73bf6016c05822614afe545b9f7c291a79

    • SHA512

      3f08b4c2f6b7c4c76f27b73a0e1ac911352c70ebd26b13da11ef64591bd3111b9d253f466815d89960c3bf103afb0d5d9561237a1d250593521355babd87915e

    • SSDEEP

      384:sNQCT0i9HdTe/kCOyU73oflQDXSikrAF+rMRTyN/0L+EcoinblneHQM3epzXqNrJ:yVt1CFU73oSDSPrM+rMRa8NuA9t

    Score
    8/10
    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks