General

  • Target

    EqualizerAPO64-1.3.22.exe

  • Size

    8.4MB

  • Sample

    240701-rkjp5swcng

  • MD5

    b4a015419ef039e58fedb58cdd5d706c

  • SHA1

    1eb8242f3ce3885cbe2f3a3628eebb999acf98f4

  • SHA256

    a3f9f0c3c3fb26d6bfb7070f4d482ee4c4c89b854e6af584ad81163009f0088f

  • SHA512

    17fd9aebb5777b2ecdb70057f0194b38b04b7afe0f1f019ed421772512a6695050c2f25c05e1154361b7286551f5ed0f697b50862a555ffef71d5fc8d7b35b32

  • SSDEEP

    196608:0S/JNM5oABvx6GIkIuyXa2KVyryjo7IntoQr1ufNlD:lNcHx6GIkwk081Ul5

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

193.161.193.99:39182

Mutex

4125c130cbe403b385d2b9f5c3d60410

Attributes
  • reg_key

    4125c130cbe403b385d2b9f5c3d60410

  • splitter

    |'|'|

Targets

    • Target

      EqualizerAPO64-1.3.22.exe

    • Size

      8.4MB

    • MD5

      b4a015419ef039e58fedb58cdd5d706c

    • SHA1

      1eb8242f3ce3885cbe2f3a3628eebb999acf98f4

    • SHA256

      a3f9f0c3c3fb26d6bfb7070f4d482ee4c4c89b854e6af584ad81163009f0088f

    • SHA512

      17fd9aebb5777b2ecdb70057f0194b38b04b7afe0f1f019ed421772512a6695050c2f25c05e1154361b7286551f5ed0f697b50862a555ffef71d5fc8d7b35b32

    • SSDEEP

      196608:0S/JNM5oABvx6GIkIuyXa2KVyryjo7IntoQr1ufNlD:lNcHx6GIkwk081Ul5

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Tasks