General

  • Target

    Server.exe

  • Size

    93KB

  • Sample

    241117-zcq39axmbs

  • MD5

    77569c49188ab04b3ed8fef0dfbef2cf

  • SHA1

    413db869e07385a42e1f9a1209822fa41ec8cf8a

  • SHA256

    dee23e85d531e80655457b017752bb99378ba91819e5a85ccf9343a1094a1a4c

  • SHA512

    ea2b7c6e94f0559f9d1ac48f797e4fe40849e531088cb4a145247d6ad9da9488f2ce1acf0f7384ecf7df8fb5165470919de75e12cd2bf554d47cde14853ffe2a

  • SSDEEP

    1536:RGbJD/HBZbszKu9AZpd7r1jEwzGi1dD3DEgS:RGqzK4AZ3HCi1dn9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

paper-cancelled.gl.at.ply.gg:51045

Mutex

7771b946967346d29becdca43bc7858a

Attributes
  • reg_key

    7771b946967346d29becdca43bc7858a

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      93KB

    • MD5

      77569c49188ab04b3ed8fef0dfbef2cf

    • SHA1

      413db869e07385a42e1f9a1209822fa41ec8cf8a

    • SHA256

      dee23e85d531e80655457b017752bb99378ba91819e5a85ccf9343a1094a1a4c

    • SHA512

      ea2b7c6e94f0559f9d1ac48f797e4fe40849e531088cb4a145247d6ad9da9488f2ce1acf0f7384ecf7df8fb5165470919de75e12cd2bf554d47cde14853ffe2a

    • SSDEEP

      1536:RGbJD/HBZbszKu9AZpd7r1jEwzGi1dD3DEgS:RGqzK4AZ3HCi1dn9

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks