General

  • Target

    1f4b7d2f534977627fa2a529013a5b58.exe

  • Size

    37KB

  • Sample

    231124-skgq8acb52

  • MD5

    1f4b7d2f534977627fa2a529013a5b58

  • SHA1

    88077cc48814bc2743ab721f4ae6a5a09724e6ee

  • SHA256

    dfe9486e22f4ff0d0c02ec2b0db5c50ee4e3b1c5309f0a39043640e19bada517

  • SHA512

    739d25226f323c141fbda2dbf5cf7f98787487be36621186b6815f147bd1e8c04dfc0cbc057a3f5bf83aa676f1c939a3e571f324142528dbc5e0a9ceeb207186

  • SSDEEP

    384:FuSvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXz:4S7TZ38fvCv3E1c1rM+rMRa8NuUet

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:10759

Mutex

661b6ea41f1ed0c4de944947a67f44a1

Attributes
  • reg_key

    661b6ea41f1ed0c4de944947a67f44a1

  • splitter

    |'|'|

Targets

    • Target

      1f4b7d2f534977627fa2a529013a5b58.exe

    • Size

      37KB

    • MD5

      1f4b7d2f534977627fa2a529013a5b58

    • SHA1

      88077cc48814bc2743ab721f4ae6a5a09724e6ee

    • SHA256

      dfe9486e22f4ff0d0c02ec2b0db5c50ee4e3b1c5309f0a39043640e19bada517

    • SHA512

      739d25226f323c141fbda2dbf5cf7f98787487be36621186b6815f147bd1e8c04dfc0cbc057a3f5bf83aa676f1c939a3e571f324142528dbc5e0a9ceeb207186

    • SSDEEP

      384:FuSvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXz:4S7TZ38fvCv3E1c1rM+rMRa8NuUet

    Score
    8/10
    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks