General

  • Target

    mason.exe

  • Size

    37KB

  • Sample

    240522-gckx5adf86

  • MD5

    a0f12925c12879a07c9be4ab0af9403b

  • SHA1

    4c51dd1593f37b84e8a8f862bc3331a4e346e10c

  • SHA256

    085c75ce23e613be57511c5a2dc46b27ae0311ba058e7299ffdbf0226047b3e9

  • SHA512

    9c33817572ff1ae66dafb7f6b589ad48fa62831738fc02240969f7df47895f55d257a35ed38f13b6d1b288d67fa68a6173c2344088bdaec880d2d4cbec538765

  • SSDEEP

    384:WmOs0IiejvCVLO309QmykrtG+dA+VfwvOSifrAF+rMRTyN/0L+EcoinblneHQM3X:wFdGdkrgYRwWS0rM+rMRa8NuIuELt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:10614

Mutex

dc3ed1d63dce2fa967ece36fb1f7673e

Attributes
  • reg_key

    dc3ed1d63dce2fa967ece36fb1f7673e

  • splitter

    |'|'|

Targets

    • Target

      mason.exe

    • Size

      37KB

    • MD5

      a0f12925c12879a07c9be4ab0af9403b

    • SHA1

      4c51dd1593f37b84e8a8f862bc3331a4e346e10c

    • SHA256

      085c75ce23e613be57511c5a2dc46b27ae0311ba058e7299ffdbf0226047b3e9

    • SHA512

      9c33817572ff1ae66dafb7f6b589ad48fa62831738fc02240969f7df47895f55d257a35ed38f13b6d1b288d67fa68a6173c2344088bdaec880d2d4cbec538765

    • SSDEEP

      384:WmOs0IiejvCVLO309QmykrtG+dA+VfwvOSifrAF+rMRTyN/0L+EcoinblneHQM3X:wFdGdkrgYRwWS0rM+rMRa8NuIuELt

    Score
    8/10
    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

System Information Discovery

5
T1082

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks