General

  • Target

    3e0989968e10dadcb61b5e9cb002649d0a159360603ca08cdc1a7c3bf07978ed

  • Size

    22KB

  • Sample

    231110-r6qqksad65

  • MD5

    32f6f1b7e94693e2fd6da21fed56d9c5

  • SHA1

    d29aca5fb0ec6d61150ea369f5df77c025e703f5

  • SHA256

    3e0989968e10dadcb61b5e9cb002649d0a159360603ca08cdc1a7c3bf07978ed

  • SHA512

    a3072ddc5afdfd07f9cbb5c6645cd660918b81c8ce29606594d20b66b3af7e5e14d53c99301dd21e9fbb26209ac6198e4d3c886b62fc667451c01c53e40b30cb

  • SSDEEP

    384:BcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZvx:C30py6vhxaRpcnuO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Zombie

C2

211.46.138.35:5552

Mutex

cbb3a712d1a75790a91a65010eecc116

Attributes
  • reg_key

    cbb3a712d1a75790a91a65010eecc116

  • splitter

    |'|'|

Targets

    • Target

      3e0989968e10dadcb61b5e9cb002649d0a159360603ca08cdc1a7c3bf07978ed

    • Size

      22KB

    • MD5

      32f6f1b7e94693e2fd6da21fed56d9c5

    • SHA1

      d29aca5fb0ec6d61150ea369f5df77c025e703f5

    • SHA256

      3e0989968e10dadcb61b5e9cb002649d0a159360603ca08cdc1a7c3bf07978ed

    • SHA512

      a3072ddc5afdfd07f9cbb5c6645cd660918b81c8ce29606594d20b66b3af7e5e14d53c99301dd21e9fbb26209ac6198e4d3c886b62fc667451c01c53e40b30cb

    • SSDEEP

      384:BcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZvx:C30py6vhxaRpcnuO

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks