General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1157926082046087209/1157984935236345856/Server.exe?ex=651a9902&is=65194782&hm=8d8383e30c6e9367f51596774f6fa35d3b40a22d6568aac6ad3b11d568ae6583&
Resource
win10v2004-20230915-en
16 signatures
1800 seconds
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
hakim32.ddns.net:2000
147.185.221.16:57012
Mutex
67b58e0872c1b83ef9c9f017e194d03d
Attributes
-
reg_key
67b58e0872c1b83ef9c9f017e194d03d
-
splitter
|'|'|
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1157926082046087209/1157984935236345856/Server.exe?ex=651a9902&is=65194782&hm=8d8383e30c6e9367f51596774f6fa35d3b40a22d6568aac6ad3b11d568ae6583&
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Drops file in System32 directory
-