Resubmissions

29/03/2025, 14:07

250329-rfbhzawn16 10

29/03/2025, 13:44

250329-q17w8swly5 10

General

  • Target

    Kaspersky.exe

  • Size

    93KB

  • Sample

    250329-q17w8swly5

  • MD5

    327274bc008bf3d8e260af2a4b70d059

  • SHA1

    d4058bac2970b6d2da5b77c3fb5dffeec236262c

  • SHA256

    a13ed5c6556e32a91cb9379fac3ccf5db98c42b157dfb89288f5a75ca326bc75

  • SHA512

    bae8fc052a696de14760336a896290f304182024cfdd5176f112d93f0d7e14b6a632b0e7e01f3744df1dc5f7b9e003d61088a900a7ed7b2ad2797250d725757b

  • SSDEEP

    1536:7V4FQWqkqqoLc2m+isjEwzGi1dDsDMgS:7V4mkqqoA2xiti1dal

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

cheater

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok.io:17350

Mutex

09a86df6668fdfee2a06a5034dda1e09

Attributes
  • reg_key

    09a86df6668fdfee2a06a5034dda1e09

  • splitter

    |'|'|

Targets

    • Target

      Kaspersky.exe

    • Size

      93KB

    • MD5

      327274bc008bf3d8e260af2a4b70d059

    • SHA1

      d4058bac2970b6d2da5b77c3fb5dffeec236262c

    • SHA256

      a13ed5c6556e32a91cb9379fac3ccf5db98c42b157dfb89288f5a75ca326bc75

    • SHA512

      bae8fc052a696de14760336a896290f304182024cfdd5176f112d93f0d7e14b6a632b0e7e01f3744df1dc5f7b9e003d61088a900a7ed7b2ad2797250d725757b

    • SSDEEP

      1536:7V4FQWqkqqoLc2m+isjEwzGi1dDsDMgS:7V4mkqqoA2xiti1dal

    • Modifies Windows Defender DisableAntiSpyware settings

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks