General

  • Target

    d59c7ccf805724c5a8704e0ed9e457bfe33b61e150d646c1da2703e30c22da9e.exe

  • Size

    52KB

  • Sample

    240725-gyjl7asglj

  • MD5

    1a4ac0f78511c028b51e0b302b080946

  • SHA1

    cf5d9e076aabb18759dfeabf59f4328f3fe30088

  • SHA256

    d59c7ccf805724c5a8704e0ed9e457bfe33b61e150d646c1da2703e30c22da9e

  • SHA512

    c38e8742bdfc93aa4b6ffc4789e4e1b844c276bc61eff07729df70781d30ad9f2aab2b2d0290235d828bc556be996f53ded0441440c93b1249abc6e03c855bbf

  • SSDEEP

    768:PKXTZ38f7CTv8FwKrM+rMRa8NujBtUmQGPL4vzZq2o9W7GsxBbPr:PiTZsTCTv8u1+gRJNA49GCq2iW7z

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

8.tcp.ngrok.io:10489

Mutex

d7fee67e410cfbc876590bf5c06c5f19

Attributes
  • reg_key

    d7fee67e410cfbc876590bf5c06c5f19

  • splitter

    |'|'|

Targets

    • Target

      d59c7ccf805724c5a8704e0ed9e457bfe33b61e150d646c1da2703e30c22da9e.exe

    • Size

      52KB

    • MD5

      1a4ac0f78511c028b51e0b302b080946

    • SHA1

      cf5d9e076aabb18759dfeabf59f4328f3fe30088

    • SHA256

      d59c7ccf805724c5a8704e0ed9e457bfe33b61e150d646c1da2703e30c22da9e

    • SHA512

      c38e8742bdfc93aa4b6ffc4789e4e1b844c276bc61eff07729df70781d30ad9f2aab2b2d0290235d828bc556be996f53ded0441440c93b1249abc6e03c855bbf

    • SSDEEP

      768:PKXTZ38f7CTv8FwKrM+rMRa8NujBtUmQGPL4vzZq2o9W7GsxBbPr:PiTZsTCTv8u1+gRJNA49GCq2iW7z

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks