General

  • Target

    2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp

  • Size

    72KB

  • Sample

    231204-zma5safd9v

  • MD5

    1c298039c674d1243bffd7189636b229

  • SHA1

    305a79eb4d2c48edc2c11765b1d6e8b418d74fef

  • SHA256

    2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7

  • SHA512

    174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8

  • SSDEEP

    384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

abdoooo3.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      2040-8-0x0000000001E80000-0x0000000001E92000-memory.dmp

    • Size

      72KB

    • MD5

      1c298039c674d1243bffd7189636b229

    • SHA1

      305a79eb4d2c48edc2c11765b1d6e8b418d74fef

    • SHA256

      2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7

    • SHA512

      174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8

    • SSDEEP

      384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L

    Score
    7/10
    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks