General

  • Target

    free robux by jan.exe

  • Size

    37KB

  • Sample

    241021-we78rszdrb

  • MD5

    890ee6656ca4c3b83fd466f7cfb985d4

  • SHA1

    b66619a4c85075912452f245ad488698819716ea

  • SHA256

    653bfeb94f41c3a3e35b39f8f980393fcbed4c4ee1f82c2e82d9f1089f2b08fa

  • SHA512

    08bdf9bdedd4921b2b302daa533c314676bb8ccfe2346e07daf19e7eb03142223238865ed80a94841de3b8269be7ee7436b297354473986986240dc4f08186ff

  • SSDEEP

    384:4yVvEiTbTvpWNcZ0y8fvCv3v3HLkacparAF+rMRTyN/0L+EcoinblneHQM3epzX9:JV7TZ38fvCv3v1cQrM+rMRa8Nudrt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

dancer

C2

7.tcp.eu.ngrok.io:14076

Mutex

78bd20d76fe16a23d2ebbd3cf81edd1c

Attributes
  • reg_key

    78bd20d76fe16a23d2ebbd3cf81edd1c

  • splitter

    |'|'|

Targets

    • Target

      free robux by jan.exe

    • Size

      37KB

    • MD5

      890ee6656ca4c3b83fd466f7cfb985d4

    • SHA1

      b66619a4c85075912452f245ad488698819716ea

    • SHA256

      653bfeb94f41c3a3e35b39f8f980393fcbed4c4ee1f82c2e82d9f1089f2b08fa

    • SHA512

      08bdf9bdedd4921b2b302daa533c314676bb8ccfe2346e07daf19e7eb03142223238865ed80a94841de3b8269be7ee7436b297354473986986240dc4f08186ff

    • SSDEEP

      384:4yVvEiTbTvpWNcZ0y8fvCv3v3HLkacparAF+rMRTyN/0L+EcoinblneHQM3epzX9:JV7TZ38fvCv3v1cQrM+rMRa8Nudrt

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks