General
-
Target
botnet.exe
-
Size
198KB
-
Sample
250114-r92x1ssrek
-
MD5
3d257d086f0deb8f071750ecd2f0920d
-
SHA1
aba1c55c9b4b6508b18731890fb53bb3a9c1ab0f
-
SHA256
677dbc521d1d7babe3fc7676f20083ba4b712b910301bef2c0fd250a25fc6984
-
SHA512
f3b191f46aa3b801618366a027a40a5b6df420eef2f875f295c7146666aa3d8bfbd01d5405d8b6e779a31e8e79530a91aa69028d6cf011163b97a9491894b74a
-
SSDEEP
6144:PMhkGNbq9+R0asskirU+sHzSTWv42iRhuq5T25:kctZlirtWv42J
Static task
static1
Behavioral task
behavioral1
Sample
botnet.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
botnet.exe
-
Size
198KB
-
MD5
3d257d086f0deb8f071750ecd2f0920d
-
SHA1
aba1c55c9b4b6508b18731890fb53bb3a9c1ab0f
-
SHA256
677dbc521d1d7babe3fc7676f20083ba4b712b910301bef2c0fd250a25fc6984
-
SHA512
f3b191f46aa3b801618366a027a40a5b6df420eef2f875f295c7146666aa3d8bfbd01d5405d8b6e779a31e8e79530a91aa69028d6cf011163b97a9491894b74a
-
SSDEEP
6144:PMhkGNbq9+R0asskirU+sHzSTWv42iRhuq5T25:kctZlirtWv42J
-
Njrat family
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1