General

  • Target

    7z.exe

  • Size

    37KB

  • Sample

    241018-lqp68azdpa

  • MD5

    6abaab6c3d6b1446b67325bcd14d11d4

  • SHA1

    052a7939b40f1862527529ba3b5f2ac4a6bea466

  • SHA256

    14e564b871915d4d37cf992c664252ddd390e954ba9ccf0629aa497184df5d5d

  • SHA512

    e9b278ef46ff891ae053195a6eb8c171b9de637e13c4875c5c0a7c11383f6fdc1b6104ac7428029b1972a3eedc4ae2c361e971796cbf05a3a49080f531c56be2

  • SSDEEP

    384:xE2KMizdVjnBhFbJ8ycPN/fnGwacpirAF+rMRTyN/0L+EcoinblneHQM3epzXzND:u2gVlLJfcPN/elcIrM+rMRa8Nu1nt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

dimoooon

C2

0.tcp.eu.ngrok.io:14390

Mutex

53da636c3443978b1b39bf98a305c8ba

Attributes
  • reg_key

    53da636c3443978b1b39bf98a305c8ba

  • splitter

    |'|'|

Targets

    • Target

      7z.exe

    • Size

      37KB

    • MD5

      6abaab6c3d6b1446b67325bcd14d11d4

    • SHA1

      052a7939b40f1862527529ba3b5f2ac4a6bea466

    • SHA256

      14e564b871915d4d37cf992c664252ddd390e954ba9ccf0629aa497184df5d5d

    • SHA512

      e9b278ef46ff891ae053195a6eb8c171b9de637e13c4875c5c0a7c11383f6fdc1b6104ac7428029b1972a3eedc4ae2c361e971796cbf05a3a49080f531c56be2

    • SSDEEP

      384:xE2KMizdVjnBhFbJ8ycPN/fnGwacpirAF+rMRTyN/0L+EcoinblneHQM3epzXzND:u2gVlLJfcPN/elcIrM+rMRa8Nu1nt

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks