General

  • Target

    kostyapvealt.exe

  • Size

    37KB

  • Sample

    241016-vqwtfavfjm

  • MD5

    64e78b2e941c1b43d37ef11f3b32e1bb

  • SHA1

    33dedf85c8752624c62ca72850bd371ef9c51ae3

  • SHA256

    3ecfaa681e3e1273c4ffadc28187573a6f32d7c69694b90fa87c98dc71e5dc39

  • SHA512

    a52a0088ff2f1e9f9eba7299e29c7ee4db1288f7bf8d6db78a560de0e199f64708edeee03d5f305bb046c025355da779887a766fba6c85beaa90ee368db1f5bc

  • SSDEEP

    384:5QNcoixJ/l7OHg1WykrHD3HC8GYPdArAF+rMRTyN/0L+EcoinblneHQM3epzXHVE:SN+R1NkrHDSNYVArM+rMRa8NulVst

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HCK

C2

4.tcp.eu.ngrok.io:18495

Mutex

1126d5bd446b30f6a40a8f76e33de5d2

Attributes
  • reg_key

    1126d5bd446b30f6a40a8f76e33de5d2

  • splitter

    |'|'|

Targets

    • Target

      kostyapvealt.exe

    • Size

      37KB

    • MD5

      64e78b2e941c1b43d37ef11f3b32e1bb

    • SHA1

      33dedf85c8752624c62ca72850bd371ef9c51ae3

    • SHA256

      3ecfaa681e3e1273c4ffadc28187573a6f32d7c69694b90fa87c98dc71e5dc39

    • SHA512

      a52a0088ff2f1e9f9eba7299e29c7ee4db1288f7bf8d6db78a560de0e199f64708edeee03d5f305bb046c025355da779887a766fba6c85beaa90ee368db1f5bc

    • SSDEEP

      384:5QNcoixJ/l7OHg1WykrHD3HC8GYPdArAF+rMRTyN/0L+EcoinblneHQM3epzXHVE:SN+R1NkrHDSNYVArM+rMRa8NulVst

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks