General

  • Target

    sosi_biby.exe

  • Size

    37KB

  • Sample

    241017-lnhz5avhrl

  • MD5

    e11aa2c789dfd4b10e77090c4c3e448f

  • SHA1

    ea62417c208415661cbcace3984f493f55eedaa8

  • SHA256

    61f6d97939e73cf2a5c172bd2a19ae50e5b4c76fb5426cb30d062e1a0bc5071d

  • SHA512

    17ce670b5a814a5181a74fee69dccd44bd0be55dc53650f0374e8bd503066a4eec10bfe503d3ad11ad845575ebb0bcb3fda2eaf23100aa8f6adc86677d33857f

  • SSDEEP

    384:fW/gUiDrblmJEpRGyEfdDPTuWCYqAlLrAF+rMRTyN/0L+EcoinblneHQM3epzX9J:e/yHpR9EfdDCWClAprM+rMRa8Nu/vzt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

noob

C2

6.tcp.eu.ngrok.io:17297

Mutex

612b5654a765e68b788c9882725c66ac

Attributes
  • reg_key

    612b5654a765e68b788c9882725c66ac

  • splitter

    |'|'|

Targets

    • Target

      sosi_biby.exe

    • Size

      37KB

    • MD5

      e11aa2c789dfd4b10e77090c4c3e448f

    • SHA1

      ea62417c208415661cbcace3984f493f55eedaa8

    • SHA256

      61f6d97939e73cf2a5c172bd2a19ae50e5b4c76fb5426cb30d062e1a0bc5071d

    • SHA512

      17ce670b5a814a5181a74fee69dccd44bd0be55dc53650f0374e8bd503066a4eec10bfe503d3ad11ad845575ebb0bcb3fda2eaf23100aa8f6adc86677d33857f

    • SSDEEP

      384:fW/gUiDrblmJEpRGyEfdDPTuWCYqAlLrAF+rMRTyN/0L+EcoinblneHQM3epzX9J:e/yHpR9EfdDCWClAprM+rMRa8Nu/vzt

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks