General

  • Target

    Server22.exe

  • Size

    36KB

  • Sample

    240721-wsdw3s1bnp

  • MD5

    a999dbe7f1ccae86eae73f30950edc69

  • SHA1

    a02f41e70bbba5d98386f328365e40e376644e57

  • SHA256

    fed8c3b6b74a39a3a7d759e8d9df768f2df2b4ac64f26efb5dfb60071a96d32d

  • SHA512

    39be4c91ca5eb0c11f0499ae9886016b854664a32efee465d895351074f9c5fcd0a28ee70ae4e8fbcd880ad85c8f11a28ab42ae4130fffe9cc44c323630bde6a

  • SSDEEP

    384:hv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXE:95LHJ7k/G4ObZr6GrM+rMRa8NuZ9+t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

ضحايا Repo

C2

147.185.221.21:19455

Mutex

ff08ef465dd80a9af68f3e1ab659a49e

Attributes
  • reg_key

    ff08ef465dd80a9af68f3e1ab659a49e

  • splitter

    |'|'|

Targets

    • Target

      Server22.exe

    • Size

      36KB

    • MD5

      a999dbe7f1ccae86eae73f30950edc69

    • SHA1

      a02f41e70bbba5d98386f328365e40e376644e57

    • SHA256

      fed8c3b6b74a39a3a7d759e8d9df768f2df2b4ac64f26efb5dfb60071a96d32d

    • SHA512

      39be4c91ca5eb0c11f0499ae9886016b854664a32efee465d895351074f9c5fcd0a28ee70ae4e8fbcd880ad85c8f11a28ab42ae4130fffe9cc44c323630bde6a

    • SSDEEP

      384:hv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXE:95LHJ7k/G4ObZr6GrM+rMRa8NuZ9+t

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks