General

  • Target

    Server1.exe

  • Size

    37KB

  • Sample

    241207-avrp3awmct

  • MD5

    ee0d1c2878ace4ef0022d2f09abe9ccc

  • SHA1

    8096d9c801aebad2e58c48698cfc84c73639120f

  • SHA256

    a4c6a71f2fef67eec9b45057a8f32e7ef367aa19a86611c0c639716c18d9d1c3

  • SHA512

    6e5e3db707b1e59390a21b1b84736166401d7da1e30f8531cded5b23c8c602966ec5816dd20c85eb10bdf82ffb7c3742f3223917dc547947cee68c353fe26014

  • SSDEEP

    384:Xunq1rCiMH3jBVbJsy8P5MbAoxv/vvQ6kxOrAF+rMRTyN/0L+EcoinblneHQM3eX:+n9bJP8P5AAiH1kErM+rMRa8Nuoct

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

until-delivering.gl.at.ply.gg:47346

Mutex

aa79b00d0228f4911d1b8f29eeadae45

Attributes
  • reg_key

    aa79b00d0228f4911d1b8f29eeadae45

  • splitter

    |'|'|

Targets

    • Target

      Server1.exe

    • Size

      37KB

    • MD5

      ee0d1c2878ace4ef0022d2f09abe9ccc

    • SHA1

      8096d9c801aebad2e58c48698cfc84c73639120f

    • SHA256

      a4c6a71f2fef67eec9b45057a8f32e7ef367aa19a86611c0c639716c18d9d1c3

    • SHA512

      6e5e3db707b1e59390a21b1b84736166401d7da1e30f8531cded5b23c8c602966ec5816dd20c85eb10bdf82ffb7c3742f3223917dc547947cee68c353fe26014

    • SSDEEP

      384:Xunq1rCiMH3jBVbJsy8P5MbAoxv/vvQ6kxOrAF+rMRTyN/0L+EcoinblneHQM3eX:+n9bJP8P5AAiH1kErM+rMRa8Nuoct

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks