General

  • Target

    Server.exe

  • Size

    15.0MB

  • Sample

    250113-xk95zstmcz

  • MD5

    23516f2c7db3247a024c98662bc52e10

  • SHA1

    be8144182ffb60c6cfdb77cf8a63e5a9c0343423

  • SHA256

    15a7486e081a2edc7ddfd2939ffa86db1bdbe914af99c46d3b2a5d1ff4a61327

  • SHA512

    6da9f20ec94ec371b4ba0635c1f5d10a9697d03991648920e49377c8b90fe8e4e648b3b637a7ee8b4c6624b9ede638348c85de2aff29aad1c23e6b2a6ef5c89a

  • SSDEEP

    1536:UHQMIIR8eGntGPm0ajEwzGi1dDNNDRgS:CQc8eGntG+0ji1dhVO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

06faa19f58d8b6ec5d70bb2c8e7a5a8b

Attributes
  • reg_key

    06faa19f58d8b6ec5d70bb2c8e7a5a8b

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      15.0MB

    • MD5

      23516f2c7db3247a024c98662bc52e10

    • SHA1

      be8144182ffb60c6cfdb77cf8a63e5a9c0343423

    • SHA256

      15a7486e081a2edc7ddfd2939ffa86db1bdbe914af99c46d3b2a5d1ff4a61327

    • SHA512

      6da9f20ec94ec371b4ba0635c1f5d10a9697d03991648920e49377c8b90fe8e4e648b3b637a7ee8b4c6624b9ede638348c85de2aff29aad1c23e6b2a6ef5c89a

    • SSDEEP

      1536:UHQMIIR8eGntGPm0ajEwzGi1dDNNDRgS:CQc8eGntG+0ji1dhVO

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Drops startup file

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks