General

  • Target

    SolararB5.1.exe

  • Size

    25.0MB

  • Sample

    240622-vbbvqazalj

  • MD5

    dcff6f093bdaf3d7df4845f39834ea27

  • SHA1

    d304cbd44a432a8e7b756f4bc4da770cd4abba8a

  • SHA256

    199199951d5ec31ad1f699ee996d96524e5022a8af45797777d16488224424d5

  • SHA512

    842471ed4edcf6b1a9c5e6c4c06209a1ab8058619b5122b5b95c2917322f23f59004a275cce313dc1b44a831b42d2f77613cb79fb3ebaf94551e3d94b39a80cf

  • SSDEEP

    768:QY3reZFKghFchQVTqWnwz/1h3XE/blczxXSsvXxrjEtCdnl2pi1Rz4Rk3usGdpo3:Te/K6bTq8itNE2VhjEwzGi1dDKDogS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Debil

C2

hakim32.ddns.net:2000

127.0.0.1:446

Mutex

2c030f9e6d6e7a75ab6016f5c301de1a

Attributes
  • reg_key

    2c030f9e6d6e7a75ab6016f5c301de1a

  • splitter

    |'|'|

Targets

    • Target

      SolararB5.1.exe

    • Size

      25.0MB

    • MD5

      dcff6f093bdaf3d7df4845f39834ea27

    • SHA1

      d304cbd44a432a8e7b756f4bc4da770cd4abba8a

    • SHA256

      199199951d5ec31ad1f699ee996d96524e5022a8af45797777d16488224424d5

    • SHA512

      842471ed4edcf6b1a9c5e6c4c06209a1ab8058619b5122b5b95c2917322f23f59004a275cce313dc1b44a831b42d2f77613cb79fb3ebaf94551e3d94b39a80cf

    • SSDEEP

      768:QY3reZFKghFchQVTqWnwz/1h3XE/blczxXSsvXxrjEtCdnl2pi1Rz4Rk3usGdpo3:Te/K6bTq8itNE2VhjEwzGi1dDKDogS

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks