General

  • Target

    ee4488c7a72d0d32919434817a39f71243974ed2690c61fa6d65071f7c8f8dd8N

  • Size

    37KB

  • Sample

    241003-revkfssend

  • MD5

    b01aacd411132ba26719cb5b13104590

  • SHA1

    15cac8eab1ff1ef17f2b3a78ad287d1b9b526cc8

  • SHA256

    ee4488c7a72d0d32919434817a39f71243974ed2690c61fa6d65071f7c8f8dd8

  • SHA512

    b3c822bb8327ba50dbd2310d1b9bd27277876e198af2304aa53a76467be2e6e3cf84408d12b69c1d0df55956de881d51ad681810160b2c4559048d3549377d74

  • SSDEEP

    384:a2FZxj6ic7ri5Z7JAyk/Y4IvDfZeKQVerAF+rMRTyN/0L+EcoinblneHQM3epzXV:DFnHJ7k/Y4IDZbQorM+rMRa8Numet

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

string-pension.gl.at.ply.gg:58688

Mutex

0d20f9ceebca5d8748160666528ac39b

Attributes
  • reg_key

    0d20f9ceebca5d8748160666528ac39b

  • splitter

    |'|'|

Targets

    • Target

      ee4488c7a72d0d32919434817a39f71243974ed2690c61fa6d65071f7c8f8dd8N

    • Size

      37KB

    • MD5

      b01aacd411132ba26719cb5b13104590

    • SHA1

      15cac8eab1ff1ef17f2b3a78ad287d1b9b526cc8

    • SHA256

      ee4488c7a72d0d32919434817a39f71243974ed2690c61fa6d65071f7c8f8dd8

    • SHA512

      b3c822bb8327ba50dbd2310d1b9bd27277876e198af2304aa53a76467be2e6e3cf84408d12b69c1d0df55956de881d51ad681810160b2c4559048d3549377d74

    • SSDEEP

      384:a2FZxj6ic7ri5Z7JAyk/Y4IvDfZeKQVerAF+rMRTyN/0L+EcoinblneHQM3epzXV:DFnHJ7k/Y4IDZbQorM+rMRa8Numet

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks