General

  • Target

    ServeFDr.exe

  • Size

    93KB

  • Sample

    231205-v1hdssdg39

  • MD5

    9af8fc91af5e99e4373cbb5713dd40ec

  • SHA1

    3ec0d34c5769ec819cb02a2d0bc8f7fde20505c9

  • SHA256

    1e7708aaa98da8303b9826e82ed2d0777a5684ecda49071eb91c9d0db4e02172

  • SHA512

    fb7bb746f660e024ed78c66ab9f5685e1d28b851dbf5227ddd09e686f13b8f3537c7678b8794e02362a99e83e462e8f9d9c7934aa3c83ef5db0c83c7fa1817ab

  • SSDEEP

    1536:p+jJD/HBZbszKu9AZpy7r1jEwzGi1dDnDagS:p+CzK4AZwHCi1dXf

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

43.249.38.36:5552

Mutex

e50c2e388f4a4092e8a1f2b2c9786ee0

Attributes
  • reg_key

    e50c2e388f4a4092e8a1f2b2c9786ee0

  • splitter

    |'|'|

Targets

    • Target

      ServeFDr.exe

    • Size

      93KB

    • MD5

      9af8fc91af5e99e4373cbb5713dd40ec

    • SHA1

      3ec0d34c5769ec819cb02a2d0bc8f7fde20505c9

    • SHA256

      1e7708aaa98da8303b9826e82ed2d0777a5684ecda49071eb91c9d0db4e02172

    • SHA512

      fb7bb746f660e024ed78c66ab9f5685e1d28b851dbf5227ddd09e686f13b8f3537c7678b8794e02362a99e83e462e8f9d9c7934aa3c83ef5db0c83c7fa1817ab

    • SSDEEP

      1536:p+jJD/HBZbszKu9AZpy7r1jEwzGi1dDnDagS:p+CzK4AZwHCi1dXf

    Score
    8/10
    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Drops startup file

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks