General

  • Target

    d53390e08acb0126eceb6eba27a1d9a0ce74b0441961f1f6ac1191ab61ff94fd

  • Size

    3.7MB

  • Sample

    210922-qfhfvafcbp

  • MD5

    4b4dc6e050a52577e40b23eb0f2f1643

  • SHA1

    adc7f113b6fb190df89c41147a01206ab85411c5

  • SHA256

    d53390e08acb0126eceb6eba27a1d9a0ce74b0441961f1f6ac1191ab61ff94fd

  • SHA512

    3e9e205d10ea3fab1d436cccc157627103e41ff857da7ff733e3cf95cdae9f2e149f8d3b9817c4035edf9bc5de4d62ec6744d7d2c67321f28ef18d5b6ec77ca0

Malware Config

Targets

    • Target

      d53390e08acb0126eceb6eba27a1d9a0ce74b0441961f1f6ac1191ab61ff94fd

    • Size

      3.7MB

    • MD5

      4b4dc6e050a52577e40b23eb0f2f1643

    • SHA1

      adc7f113b6fb190df89c41147a01206ab85411c5

    • SHA256

      d53390e08acb0126eceb6eba27a1d9a0ce74b0441961f1f6ac1191ab61ff94fd

    • SHA512

      3e9e205d10ea3fab1d436cccc157627103e41ff857da7ff733e3cf95cdae9f2e149f8d3b9817c4035edf9bc5de4d62ec6744d7d2c67321f28ef18d5b6ec77ca0

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks