General

  • Target

    68f0121f2062aede8ae8bd52bba3c4c6c8aa19bdf32958b4e305cf716a92cc3d.exe

  • Size

    93KB

  • Sample

    241217-dpxkxaymcz

  • MD5

    68edafe0a1705d5c7dd1cb14fa1ca8ce

  • SHA1

    7e9d854c90acd7452645506874c4e6f10bfdda31

  • SHA256

    68f0121f2062aede8ae8bd52bba3c4c6c8aa19bdf32958b4e305cf716a92cc3d

  • SHA512

    89a965f783ea7f54b55a542168ff759e851eae77cdfa9e23ba76145614b798f0815f2feb8670c16f26943e83bba2ade0649d6dc83af8d87c51c42f96d015573d

  • SSDEEP

    768:JY37KBD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3WsG3:kKzOx6baIa9RIj00ljEwzGi1dDSD7gS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

003fe4ef3220cc6abe0338ba4d8225ca

Attributes
  • reg_key

    003fe4ef3220cc6abe0338ba4d8225ca

  • splitter

    |'|'|

Targets

    • Target

      68f0121f2062aede8ae8bd52bba3c4c6c8aa19bdf32958b4e305cf716a92cc3d.exe

    • Size

      93KB

    • MD5

      68edafe0a1705d5c7dd1cb14fa1ca8ce

    • SHA1

      7e9d854c90acd7452645506874c4e6f10bfdda31

    • SHA256

      68f0121f2062aede8ae8bd52bba3c4c6c8aa19bdf32958b4e305cf716a92cc3d

    • SHA512

      89a965f783ea7f54b55a542168ff759e851eae77cdfa9e23ba76145614b798f0815f2feb8670c16f26943e83bba2ade0649d6dc83af8d87c51c42f96d015573d

    • SSDEEP

      768:JY37KBD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3WsG3:kKzOx6baIa9RIj00ljEwzGi1dDSD7gS

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks