General

  • Target

    af44aa313103ca0f0b8fc6062c761ec7

  • Size

    233KB

  • Sample

    201214-nvlr3lpkzj

  • MD5

    af44aa313103ca0f0b8fc6062c761ec7

  • SHA1

    bb8932b35fa03906660ea71675e7db445f1256c0

  • SHA256

    72810f2bd35fd54d8fca2fba3b626dd86983d805df4e9e737b8b76cfc8e8c613

  • SHA512

    da2d2f1e389c948980c5bfb34ba4cc2a840ad189d1f283c7de2a18bf3e8438430e20a38c9ae69e333e4fb48d72c74814fc92470bf8b2575bfa90e54b69746829

Malware Config

Targets

    • Target

      af44aa313103ca0f0b8fc6062c761ec7

    • Size

      233KB

    • MD5

      af44aa313103ca0f0b8fc6062c761ec7

    • SHA1

      bb8932b35fa03906660ea71675e7db445f1256c0

    • SHA256

      72810f2bd35fd54d8fca2fba3b626dd86983d805df4e9e737b8b76cfc8e8c613

    • SHA512

      da2d2f1e389c948980c5bfb34ba4cc2a840ad189d1f283c7de2a18bf3e8438430e20a38c9ae69e333e4fb48d72c74814fc92470bf8b2575bfa90e54b69746829

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks