General
-
Target
Server.exe
-
Size
93KB
-
Sample
240427-1p42bahf4t
-
MD5
6d2d485c933a9a859d601c47dc5e8701
-
SHA1
727c6f1ce1fdc00aa6b99f54fe57c6a5cb29823d
-
SHA256
c783543402a3cb8e3abd162df5f759d3b968c6620c5845d93c18ae704526ad0e
-
SHA512
4db47e457fbdc32f49697c2bebac729e4a368c4363bde5d31bd76dae17ebec38cb16b146969b0d73ddf3f6f264e3cf291891875b6097d0efa3d8708f1fefe357
-
SSDEEP
1536:RU5C+xhUa9urgOBPRNvM4jEwzGi1dDADRgS:RUpUa9urgObdGi1dOO
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
green-morrison.gl.at.ply.gg:17455
7adb54a1153b6d7d2cbdd127dba79edd
-
reg_key
7adb54a1153b6d7d2cbdd127dba79edd
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
6d2d485c933a9a859d601c47dc5e8701
-
SHA1
727c6f1ce1fdc00aa6b99f54fe57c6a5cb29823d
-
SHA256
c783543402a3cb8e3abd162df5f759d3b968c6620c5845d93c18ae704526ad0e
-
SHA512
4db47e457fbdc32f49697c2bebac729e4a368c4363bde5d31bd76dae17ebec38cb16b146969b0d73ddf3f6f264e3cf291891875b6097d0efa3d8708f1fefe357
-
SSDEEP
1536:RU5C+xhUa9urgOBPRNvM4jEwzGi1dDADRgS:RUpUa9urgObdGi1dOO
-
Modifies Windows Firewall
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1