General

  • Target

    cae982c8d468fbdcafdf10c4c0ea157b

  • Size

    1.7MB

  • Sample

    201214-agmp7zv36e

  • MD5

    cae982c8d468fbdcafdf10c4c0ea157b

  • SHA1

    9c55cc086ac29516a17b473dd8b23c8713dfb6fc

  • SHA256

    8c69c1f98bd10df34fa03d0272da010d57169ea547646a7901dc598fa83cdaca

  • SHA512

    7542c061ecd4cae53c1e22bb065d6e3e62f29d75747d677dcf8ff09e5e9f664cde7362c758ee30cede9e115e64a5fb2c90194180c93e0bb0126d4290f51ae493

Malware Config

Targets

    • Target

      cae982c8d468fbdcafdf10c4c0ea157b

    • Size

      1.7MB

    • MD5

      cae982c8d468fbdcafdf10c4c0ea157b

    • SHA1

      9c55cc086ac29516a17b473dd8b23c8713dfb6fc

    • SHA256

      8c69c1f98bd10df34fa03d0272da010d57169ea547646a7901dc598fa83cdaca

    • SHA512

      7542c061ecd4cae53c1e22bb065d6e3e62f29d75747d677dcf8ff09e5e9f664cde7362c758ee30cede9e115e64a5fb2c90194180c93e0bb0126d4290f51ae493

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks