General

  • Target

    DarkLoader.exe

  • Size

    53KB

  • Sample

    240526-22fd6afd3t

  • MD5

    933eee79a0a2aeb87b75ae4000c9db84

  • SHA1

    3caeb0343dd9d90eb28babae05d596914018a08c

  • SHA256

    7c8a1f861858ab660ba9b18d3403f6f11481a78a63f61d266c0803948d9b59fd

  • SHA512

    2c15951cc9acb4a45d3caa7ebb3cf08ea1139f3fdefbc26f59bb0b88a541de409a5996c391433738b01704dce4ee00611afe1c5d0cbec071c22c975fe0fa7b00

  • SSDEEP

    768:nS7TZ38fvCv3E1c1rM+rMRa8NuKRtiHT:nuTZsHCv3Eau+gRJNBw

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:16469

Mutex

d3b2d1f551ce98af809927994e9d4293

Attributes
  • reg_key

    d3b2d1f551ce98af809927994e9d4293

  • splitter

    |'|'|

Targets

    • Target

      DarkLoader.exe

    • Size

      53KB

    • MD5

      933eee79a0a2aeb87b75ae4000c9db84

    • SHA1

      3caeb0343dd9d90eb28babae05d596914018a08c

    • SHA256

      7c8a1f861858ab660ba9b18d3403f6f11481a78a63f61d266c0803948d9b59fd

    • SHA512

      2c15951cc9acb4a45d3caa7ebb3cf08ea1139f3fdefbc26f59bb0b88a541de409a5996c391433738b01704dce4ee00611afe1c5d0cbec071c22c975fe0fa7b00

    • SSDEEP

      768:nS7TZ38fvCv3E1c1rM+rMRa8NuKRtiHT:nuTZsHCv3Eau+gRJNBw

    Score
    8/10
    • Modifies Windows Firewall

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks