General

  • Target

    27453feb82a576d638daea7fe9332780.exe

  • Size

    37KB

  • Sample

    240630-y4zc9sxflp

  • MD5

    27453feb82a576d638daea7fe9332780

  • SHA1

    d20579a0f03edf8d69b4fde7235562085cd5a4e8

  • SHA256

    0a7c2d89b2846fefa40c4afc51d690e69cd41c02e79b9eae82298b6e7cb8e750

  • SHA512

    709a48cddc6035471fa309e91abbc435933babb4d5efcc8a65756a362b38c43eb61c3892aab9862220e069ddc409528a1951f3d26d247209f4b6cdfacb24a801

  • SSDEEP

    384:pmOs0IiejvCVLO309QmykrtG+dA+VfwvOSiKrAF+rMRTyN/0L+EcoinblneHQM3j:7FdGdkrgYRwWS9rM+rMRa8Nuvwt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:19060

Mutex

e7eb820c0a4c74a5a3c4cbec9272f9f5

Attributes
  • reg_key

    e7eb820c0a4c74a5a3c4cbec9272f9f5

  • splitter

    |'|'|

Targets

    • Target

      27453feb82a576d638daea7fe9332780.exe

    • Size

      37KB

    • MD5

      27453feb82a576d638daea7fe9332780

    • SHA1

      d20579a0f03edf8d69b4fde7235562085cd5a4e8

    • SHA256

      0a7c2d89b2846fefa40c4afc51d690e69cd41c02e79b9eae82298b6e7cb8e750

    • SHA512

      709a48cddc6035471fa309e91abbc435933babb4d5efcc8a65756a362b38c43eb61c3892aab9862220e069ddc409528a1951f3d26d247209f4b6cdfacb24a801

    • SSDEEP

      384:pmOs0IiejvCVLO309QmykrtG+dA+VfwvOSiKrAF+rMRTyN/0L+EcoinblneHQM3j:7FdGdkrgYRwWS9rM+rMRa8Nuvwt

    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Command and Control

Web Service

1
T1102

Tasks