General

  • Target

    Payload.exe

  • Size

    55KB

  • Sample

    241005-sxxcfawckl

  • MD5

    3eec7c5dba3256f8a1d800c195912705

  • SHA1

    1f665891ee382308b232c309059cfba837056f06

  • SHA256

    69b77de8f22e8096ac09e41ccf4833d701228d038d0cf849beaa5bd330d4c658

  • SHA512

    f6d2122eca3838a29a3b9784781d80415504025be7482b08717bee5b7a76efac93b494797b22a0470dcf08bd67b558fffd097a91284200132d0a4347d253d4b7

  • SSDEEP

    1536:++oADn8fLNG/SbrKDD3wsNMDTXExI3pmam:yADncsqbeDD3wsNMDTXExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

veletroblox

C2

txx8luo.localto.net:6272

Mutex

b92c208d65b2ca038d9ed4c69e421e7d

Attributes
  • reg_key

    b92c208d65b2ca038d9ed4c69e421e7d

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      Payload.exe

    • Size

      55KB

    • MD5

      3eec7c5dba3256f8a1d800c195912705

    • SHA1

      1f665891ee382308b232c309059cfba837056f06

    • SHA256

      69b77de8f22e8096ac09e41ccf4833d701228d038d0cf849beaa5bd330d4c658

    • SHA512

      f6d2122eca3838a29a3b9784781d80415504025be7482b08717bee5b7a76efac93b494797b22a0470dcf08bd67b558fffd097a91284200132d0a4347d253d4b7

    • SSDEEP

      1536:++oADn8fLNG/SbrKDD3wsNMDTXExI3pmam:yADncsqbeDD3wsNMDTXExI3pm

    • Deletes itself

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks