General

  • Target

    Server.exe

  • Size

    93KB

  • Sample

    250123-xdq4jayqav

  • MD5

    96ce0bd41a130c362b1166c770960287

  • SHA1

    01bfe9caf709cb3ab3366fd7cd28a5dd95ea4b30

  • SHA256

    4fd30f330a4150ba28848121c9c0e99c98b198b6abeeceba5c08024c0ab9a851

  • SHA512

    933e6af32e68822eef6bfd941a7f027eb8aeceb745b0fb091a79aa8e327ca955e8af20e4032debbee43233b03287321abab3ca95ffc2da127ac299fada9c78c1

  • SSDEEP

    1536:ZajFQWqkqqoLc2mLiIjEwzGi1dDyDMgS:ZajmkqqoA28i5i1dkl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

193.123.88.61:4444

Mutex

9026faf0d7bc26a38f2e53c5ac0d583b

Attributes
  • reg_key

    9026faf0d7bc26a38f2e53c5ac0d583b

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      93KB

    • MD5

      96ce0bd41a130c362b1166c770960287

    • SHA1

      01bfe9caf709cb3ab3366fd7cd28a5dd95ea4b30

    • SHA256

      4fd30f330a4150ba28848121c9c0e99c98b198b6abeeceba5c08024c0ab9a851

    • SHA512

      933e6af32e68822eef6bfd941a7f027eb8aeceb745b0fb091a79aa8e327ca955e8af20e4032debbee43233b03287321abab3ca95ffc2da127ac299fada9c78c1

    • SSDEEP

      1536:ZajFQWqkqqoLc2mLiIjEwzGi1dDyDMgS:ZajmkqqoA28i5i1dkl

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks