General

  • Target

    Serverd.exe

  • Size

    37KB

  • Sample

    241004-1clzzasaka

  • MD5

    163c68ade4fd333a444f07030cec2213

  • SHA1

    8154ae3cb1ea1a89b00bcaf9ac29dce6c400ba32

  • SHA256

    d0c46a077a136a79acdf0bcc634213527f8f1320ce82530ef6c1b15f2e8aeaee

  • SHA512

    e886db439d2677938cbca429104e276c52f9a400cc119f2e0a939469196f8afb5188f4f1f39ba3cc4f712179fd1f7b1d42e821d9b64cdf4769425775dab2cf78

  • SSDEEP

    384:56Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eM:IfaC6mNhFz1Yyd4ErM+rMRa8NusJt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

ground-heavily.gl.at.ply.gg:17515

Mutex

d5dc10fa943690b23752f35ee47117e3

Attributes
  • reg_key

    d5dc10fa943690b23752f35ee47117e3

  • splitter

    |'|'|

Targets

    • Target

      Serverd.exe

    • Size

      37KB

    • MD5

      163c68ade4fd333a444f07030cec2213

    • SHA1

      8154ae3cb1ea1a89b00bcaf9ac29dce6c400ba32

    • SHA256

      d0c46a077a136a79acdf0bcc634213527f8f1320ce82530ef6c1b15f2e8aeaee

    • SHA512

      e886db439d2677938cbca429104e276c52f9a400cc119f2e0a939469196f8afb5188f4f1f39ba3cc4f712179fd1f7b1d42e821d9b64cdf4769425775dab2cf78

    • SSDEEP

      384:56Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eM:IfaC6mNhFz1Yyd4ErM+rMRa8NusJt

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks