General
-
Target
https://discord.gg/3gbQD6jK
-
Sample
241005-yvemhawdlh
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.gg/3gbQD6jK
Resource
win11-20240802-en
windows11-21h2-x64
23 signatures
1200 seconds
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
hakim32.ddns.net:2000
127.0.0.1:5552
Mutex
b4a3d1626d9951bfdb538db02f975e78
Attributes
-
reg_key
b4a3d1626d9951bfdb538db02f975e78
-
splitter
|'|'|
Targets
-
-
Target
https://discord.gg/3gbQD6jK
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1