General

  • Target

    7xGv1.rar

  • Size

    16KB

  • Sample

    250329-tw61xsxsdx

  • MD5

    b13ec2e4d3252121723ce40a3961b744

  • SHA1

    73933ad5704532b05374a99c433c1410bf2f4072

  • SHA256

    9347f295b4b16f9a6dd0513b43a58549a307547b2001781d5f1a27b4e4f34443

  • SHA512

    4cf67d3123bbaf698807fecd0ef22f52eb1b1b425ed9114320cb52814278a8365426eee76fda3b873fbbd8bc6bd1b8076d454f64664d0b2ea422fa98079d8291

  • SSDEEP

    384:ijIVgGZwjruZ4Gdc3A2YOQ5Qkb2UYo7u4UZiR:i3o2KwLTAR2l4jR

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HackedSorry

C2

127.0.0.1:5552

Mutex

72b9677783005d3ff7767152e2734d7e

Attributes
  • reg_key

    72b9677783005d3ff7767152e2734d7e

  • splitter

    |'|'|

Targets

    • Target

      7xG.exe

    • Size

      37KB

    • MD5

      a1ebbd72b02bbdbe1dd3b84fcdd32d36

    • SHA1

      57459e3813b77028b71cf1573a13ea045598a018

    • SHA256

      d6341ff7300b399cf031e26c87c0a5392f136ead1676e005c655eddcfd51a763

    • SHA512

      26cdb08be64ebefade04d048805e4a8b4b430dde0c74bb042cc438bba82c94fde3c8b8fe020d964ac7d78a48b2667fc3bade4a2235730d232fefc6b2795288d8

    • SSDEEP

      384:xMc1ZCiMd3jBVbJsy8PnabAoJ3xv1QqKVFrAF+rMRTyN/0L+EcoinblneHQM3epY:i3bJP8PnCAG/dKvrM+rMRa8Nusyqt

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks