General

  • Target

    e1707f3697443452ed3ebff0b477f13bf3a19a48a4b397fba55baaf7133f6fca

  • Size

    396KB

  • Sample

    210914-hcypnafba9

  • MD5

    656436be4766884dd8fe86631f7d101a

  • SHA1

    e527e92099388b0d77a556449ec2a3d3cdb71fbc

  • SHA256

    e1707f3697443452ed3ebff0b477f13bf3a19a48a4b397fba55baaf7133f6fca

  • SHA512

    b81b3efc74cd7bf4d0209b94711bf62d48d4507451c5c1fc8bda4be564eca74837e110646b1122d1d2805d2bf3400f43056bd082d9ac378d0d2ac5d29f6e0c3a

Malware Config

Targets

    • Target

      e1707f3697443452ed3ebff0b477f13bf3a19a48a4b397fba55baaf7133f6fca

    • Size

      396KB

    • MD5

      656436be4766884dd8fe86631f7d101a

    • SHA1

      e527e92099388b0d77a556449ec2a3d3cdb71fbc

    • SHA256

      e1707f3697443452ed3ebff0b477f13bf3a19a48a4b397fba55baaf7133f6fca

    • SHA512

      b81b3efc74cd7bf4d0209b94711bf62d48d4507451c5c1fc8bda4be564eca74837e110646b1122d1d2805d2bf3400f43056bd082d9ac378d0d2ac5d29f6e0c3a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks