General

  • Target

    6ef0658079cebc519cd469248cd6ff40dfec559c07249603a826d8cfaba263e2.exe

  • Size

    37KB

  • Sample

    240928-jpe9hsvbmq

  • MD5

    0134578a5490716ae5f1e89356d7b684

  • SHA1

    ae75f223d9130fed1691dc91b06f68d99ec7593d

  • SHA256

    6ef0658079cebc519cd469248cd6ff40dfec559c07249603a826d8cfaba263e2

  • SHA512

    65b385ef649a820f752b1da6dd799d9d6f4b87c48bedebce2c81416bf98ccdf25e581925f3e3e785131cb5c60f958f0f7545e73383478be84681fde8e45de21f

  • SSDEEP

    384:4HkZ/j6ic5ri5Z7JAyk/q4SvNtZeymkArAF+rMRTyN/0L+EcoinblneHQM3epzX3:wkrHJ7k/q4SjZLmNrM+rMRa8NuUGvt

Malware Config

Extracted

Family

njrat

Version

Kjh

Botnet

마인크래프트

C2

14.46.160.76:5552

Mutex

06d63ada0dc02c6a44ed3c3fc5c89d83

Attributes
  • reg_key

    06d63ada0dc02c6a44ed3c3fc5c89d83

  • splitter

    |'|'|

Targets

    • Target

      6ef0658079cebc519cd469248cd6ff40dfec559c07249603a826d8cfaba263e2.exe

    • Size

      37KB

    • MD5

      0134578a5490716ae5f1e89356d7b684

    • SHA1

      ae75f223d9130fed1691dc91b06f68d99ec7593d

    • SHA256

      6ef0658079cebc519cd469248cd6ff40dfec559c07249603a826d8cfaba263e2

    • SHA512

      65b385ef649a820f752b1da6dd799d9d6f4b87c48bedebce2c81416bf98ccdf25e581925f3e3e785131cb5c60f958f0f7545e73383478be84681fde8e45de21f

    • SSDEEP

      384:4HkZ/j6ic5ri5Z7JAyk/q4SvNtZeymkArAF+rMRTyN/0L+EcoinblneHQM3epzX3:wkrHJ7k/q4SjZLmNrM+rMRa8NuUGvt

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks