General

  • Target

    354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N

  • Size

    37KB

  • Sample

    240920-j43ncsxckk

  • MD5

    8a59c16c10ffa6c22770bdf07d3fb4c0

  • SHA1

    c21e6bedd447ac4855006f35df5aef68ffa75b38

  • SHA256

    354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991

  • SHA512

    9cdd20635826225b7bda3fae88d822d7eb9cf442caa6c8a3c164865208aca1cb73c17acb0c1a74f43f049d92c3c956b11013e8b27c4f724bcc750a6ec1dd6c15

  • SSDEEP

    384:/gtvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXF:Yt7TZ38fvCv3E1c1rM+rMRa8NunRt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:11961

Mutex

03b4c5d6915391a54e8f12c89b78174f

Attributes
  • reg_key

    03b4c5d6915391a54e8f12c89b78174f

  • splitter

    |'|'|

Targets

    • Target

      354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N

    • Size

      37KB

    • MD5

      8a59c16c10ffa6c22770bdf07d3fb4c0

    • SHA1

      c21e6bedd447ac4855006f35df5aef68ffa75b38

    • SHA256

      354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991

    • SHA512

      9cdd20635826225b7bda3fae88d822d7eb9cf442caa6c8a3c164865208aca1cb73c17acb0c1a74f43f049d92c3c956b11013e8b27c4f724bcc750a6ec1dd6c15

    • SSDEEP

      384:/gtvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXF:Yt7TZ38fvCv3E1c1rM+rMRa8NunRt

    • Modifies Windows Firewall

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks