General

  • Target

    Server.exe

  • Size

    93KB

  • Sample

    231211-v9pt8sehf7

  • MD5

    9d87d89dce63478fe78b1a5f05355422

  • SHA1

    bf13fe1abbb36e8d2b306bc1d84cbeb48d913fd3

  • SHA256

    c3882658f6f47e01d7666343f82f35644395affb50151587e2babcda9a855613

  • SHA512

    558e9991bfa66cab4ad38ad1f0b414ba7e410cf46742ce4e12c3c457655a68feefbe6ad54feeb27ce6f14d981d9345f81fddf3c261bf1d5ac32d85ef5523bd7a

  • SSDEEP

    1536:7OpnEoSnsqS5ut9YMR8SjEwzGi1dDnDDgS:7OVSnsqS5uTYM+7i1dn8

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

193.161.193.99:38748

Mutex

8c8517cfc71305584f78f780dfd7c323

Attributes
  • reg_key

    8c8517cfc71305584f78f780dfd7c323

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      93KB

    • MD5

      9d87d89dce63478fe78b1a5f05355422

    • SHA1

      bf13fe1abbb36e8d2b306bc1d84cbeb48d913fd3

    • SHA256

      c3882658f6f47e01d7666343f82f35644395affb50151587e2babcda9a855613

    • SHA512

      558e9991bfa66cab4ad38ad1f0b414ba7e410cf46742ce4e12c3c457655a68feefbe6ad54feeb27ce6f14d981d9345f81fddf3c261bf1d5ac32d85ef5523bd7a

    • SSDEEP

      1536:7OpnEoSnsqS5ut9YMR8SjEwzGi1dDnDDgS:7OVSnsqS5uTYM+7i1dn8

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Tasks