General

  • Target

    Server.exe

  • Size

    93KB

  • Sample

    241117-wqeetsvhkd

  • MD5

    ff16dcdc9552da753318b3430c9aef07

  • SHA1

    258c361f594ebcc8de90ee8cb9fc3dab9e442fb4

  • SHA256

    37b2146d5711734bca210f34b19e1b09b4ee03e14b2d0ce731a9a458c13818fb

  • SHA512

    d699bbad645ec19ab57c308c746f7e8a80f6197f8c6e6fe2b4a00e53d501355f4f321517fb8bc15030afe499bad39a0a155f0a4d90791be721ce2f81c97a76de

  • SSDEEP

    1536:w/5C+xhUa9urgOBPRNvM4jEwzGi1dDFDYgS:w/pUa9urgObdGi1dpB

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

else-directors.gl.at.ply.gg:56448

Mutex

62896c49bf88e588212d7d10932f1b59

Attributes
  • reg_key

    62896c49bf88e588212d7d10932f1b59

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      93KB

    • MD5

      ff16dcdc9552da753318b3430c9aef07

    • SHA1

      258c361f594ebcc8de90ee8cb9fc3dab9e442fb4

    • SHA256

      37b2146d5711734bca210f34b19e1b09b4ee03e14b2d0ce731a9a458c13818fb

    • SHA512

      d699bbad645ec19ab57c308c746f7e8a80f6197f8c6e6fe2b4a00e53d501355f4f321517fb8bc15030afe499bad39a0a155f0a4d90791be721ce2f81c97a76de

    • SSDEEP

      1536:w/5C+xhUa9urgOBPRNvM4jEwzGi1dDFDYgS:w/pUa9urgObdGi1dpB

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks