General

  • Target

    Server.exe

  • Size

    37KB

  • Sample

    240706-bfnkjatdpe

  • MD5

    e95bd77d095fbdd8bd9f5ab5046392f4

  • SHA1

    f337cf585d2f977f8a32860d7f384f1c9d902aa3

  • SHA256

    46a4549156b0348a917627ef668a9bb7cf96a3d313510858322defbc6e03e222

  • SHA512

    2e29f3f55bcbe759931a3d6752bb8f466d9c5d16f45d6f20ddd94b997afe924e6b3732acff4710193241d2d7f4d774c1ba8406708f3427a5134ee616c38851b6

  • SSDEEP

    768:q7rtsKADtOHiR4akrYBQWllykrM+rMRa8NuLOt:q7r8tVSkBQWlEH+gRJNc

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

parties-enabled.gl.at.ply.gg:57938

Mutex

4ee5f189582890a69270ea48ffc99621

Attributes
  • reg_key

    4ee5f189582890a69270ea48ffc99621

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      37KB

    • MD5

      e95bd77d095fbdd8bd9f5ab5046392f4

    • SHA1

      f337cf585d2f977f8a32860d7f384f1c9d902aa3

    • SHA256

      46a4549156b0348a917627ef668a9bb7cf96a3d313510858322defbc6e03e222

    • SHA512

      2e29f3f55bcbe759931a3d6752bb8f466d9c5d16f45d6f20ddd94b997afe924e6b3732acff4710193241d2d7f4d774c1ba8406708f3427a5134ee616c38851b6

    • SSDEEP

      768:q7rtsKADtOHiR4akrYBQWllykrM+rMRa8NuLOt:q7r8tVSkBQWlEH+gRJNc

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks