General

  • Target

    55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216dN

  • Size

    93KB

  • Sample

    241109-qgb1fsvepm

  • MD5

    6c4d2452cf967605051579479de8e3a0

  • SHA1

    980c0088d1b1ee9cd5e7a0dbc614b09d9d893cfb

  • SHA256

    55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216d

  • SHA512

    f4f96d101e53179b5224bc29149df11446161e4a93d56928c6c23e718dcc4e3099a76633b51eac64a9e48101f978cf843971cb259772106c08af475cfc28558a

  • SSDEEP

    1536:AUhSyh6zaoFjuFCVR5jEwzGi1dDVDigS:AUKzaujuCRWi1dRH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

6.tcp.eu.ngrok.io:10665

Mutex

503b153ce98cc50ea4d9ae75c01d9f4e

Attributes
  • reg_key

    503b153ce98cc50ea4d9ae75c01d9f4e

  • splitter

    |'|'|

Targets

    • Target

      55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216dN

    • Size

      93KB

    • MD5

      6c4d2452cf967605051579479de8e3a0

    • SHA1

      980c0088d1b1ee9cd5e7a0dbc614b09d9d893cfb

    • SHA256

      55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216d

    • SHA512

      f4f96d101e53179b5224bc29149df11446161e4a93d56928c6c23e718dcc4e3099a76633b51eac64a9e48101f978cf843971cb259772106c08af475cfc28558a

    • SSDEEP

      1536:AUhSyh6zaoFjuFCVR5jEwzGi1dDVDigS:AUKzaujuCRWi1dRH

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks