Resubmissions

31/08/2023, 11:07

230831-m716gsec8s 10

General

  • Target

    dskjdfkjlfkjdjfldkjfldjfdServer.exe

  • Size

    93KB

  • Sample

    230831-m716gsec8s

  • MD5

    6c235ff3554af119cf5a38c0e519f5fb

  • SHA1

    7457de3999900fa76a896ecd5d12ab09ab750dde

  • SHA256

    301a6fb626b71f2e471121fbc36042dc31a720cb79d85842773a4d4cfeade1a2

  • SHA512

    4be7c20f7ce89fbff64ca34cc115542e7492b0cfb22639828b1d4d23da7b77e2c988215e35b3b25de66a28e3cfff5ae69c1bdd3c0b24fa66b0d0f908043aeaae

  • SSDEEP

    1536:6UNJD/HBZbszKu9AZpE7r1jEwzGi1dDoDqgS:6UUzK4AZCHCi1d2v

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

tcp://4.tcp.eu.ngrok.io:11298 :11298

Mutex

46cd80c365e33ea1d918243f556490ee

Attributes
  • reg_key

    46cd80c365e33ea1d918243f556490ee

  • splitter

    |'|'|

Targets

    • Target

      dskjdfkjlfkjdjfldkjfldjfdServer.exe

    • Size

      93KB

    • MD5

      6c235ff3554af119cf5a38c0e519f5fb

    • SHA1

      7457de3999900fa76a896ecd5d12ab09ab750dde

    • SHA256

      301a6fb626b71f2e471121fbc36042dc31a720cb79d85842773a4d4cfeade1a2

    • SHA512

      4be7c20f7ce89fbff64ca34cc115542e7492b0cfb22639828b1d4d23da7b77e2c988215e35b3b25de66a28e3cfff5ae69c1bdd3c0b24fa66b0d0f908043aeaae

    • SSDEEP

      1536:6UNJD/HBZbszKu9AZpE7r1jEwzGi1dDoDqgS:6UUzK4AZCHCi1d2v

    Score
    8/10

MITRE ATT&CK Enterprise v15

Tasks