General

  • Target

    New Client.exe

  • Size

    167KB

  • Sample

    241222-aydmlswnam

  • MD5

    d3829ddb2ab4d31749f4e44726873818

  • SHA1

    ac86aad0ab079208ef1c5293b306e4022336bb3a

  • SHA256

    de7a825e9b99a298701c964a202485ee3ca8c3703f40eaf824f465aa5b259409

  • SHA512

    d3e4e55bd098ffae2435bac507bf02a89e2dee56dd04c86de91634b792bb808b5f69e66ebd51f70f5b6cc3c783c07b5b14f14e09526433498b43b0d891781d75

  • SSDEEP

    3072:WNMADoN36tnQviFCtABnKfWl9z6aF9byYvMJUJ8T2SXZyrgoBJtbN/3MCK2kevEz:Wmi9zRvM1/JdSI5eb

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:14324

Mutex

discord.exe

Attributes
  • reg_key

    discord.exe

  • splitter

    |Ghost|

Targets

    • Target

      New Client.exe

    • Size

      167KB

    • MD5

      d3829ddb2ab4d31749f4e44726873818

    • SHA1

      ac86aad0ab079208ef1c5293b306e4022336bb3a

    • SHA256

      de7a825e9b99a298701c964a202485ee3ca8c3703f40eaf824f465aa5b259409

    • SHA512

      d3e4e55bd098ffae2435bac507bf02a89e2dee56dd04c86de91634b792bb808b5f69e66ebd51f70f5b6cc3c783c07b5b14f14e09526433498b43b0d891781d75

    • SSDEEP

      3072:WNMADoN36tnQviFCtABnKfWl9z6aF9byYvMJUJ8T2SXZyrgoBJtbN/3MCK2kevEz:Wmi9zRvM1/JdSI5eb

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks