General

  • Target

    Server.exe

  • Size

    93KB

  • Sample

    241025-p6v9yszckf

  • MD5

    84cc7227d21f9c65cae6e4451f18483d

  • SHA1

    504dff55fb25343ec964f740ecaba9d7d490fde3

  • SHA256

    4a41991bfc4cdd9dcec82592963bb61f62eb3075a53273bb018dc650eec49350

  • SHA512

    db834a4009a979c17f6759597fe0f86bcccb4c726c7f7c2518d57de1ca6ee95199e6dd2a96737cb93c64b3304ae5f39318b7d0349a9c74b6606934f22adfec65

  • SSDEEP

    768:uY32ub30YTXspgM0m2zGjpyDtdXWuhtXfLWhyXxrjEtCdnl2pi1Rz4Rk3ysGdpW3:YuT0AA0mT1mrWGL5jEwzGi1dDuDWgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:1488

Mutex

194d07662fe5562b24844f1d19460971

Attributes
  • reg_key

    194d07662fe5562b24844f1d19460971

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      93KB

    • MD5

      84cc7227d21f9c65cae6e4451f18483d

    • SHA1

      504dff55fb25343ec964f740ecaba9d7d490fde3

    • SHA256

      4a41991bfc4cdd9dcec82592963bb61f62eb3075a53273bb018dc650eec49350

    • SHA512

      db834a4009a979c17f6759597fe0f86bcccb4c726c7f7c2518d57de1ca6ee95199e6dd2a96737cb93c64b3304ae5f39318b7d0349a9c74b6606934f22adfec65

    • SSDEEP

      768:uY32ub30YTXspgM0m2zGjpyDtdXWuhtXfLWhyXxrjEtCdnl2pi1Rz4Rk3ysGdpW3:YuT0AA0mT1mrWGL5jEwzGi1dDuDWgS

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks