General

  • Target

    6d2f1a98b77181cb675c0f3cd3ae6824fdd90e150c46d6fcee0ed16f7cd855df

  • Size

    2.3MB

  • Sample

    210930-jzjdxshahr

  • MD5

    751be7e898d61998e52402b813e391bf

  • SHA1

    6b8572889dbac9938e8552f05bf57496b6ab0367

  • SHA256

    6d2f1a98b77181cb675c0f3cd3ae6824fdd90e150c46d6fcee0ed16f7cd855df

  • SHA512

    baa23385c716c6fc682fad2ba963b55c957101d7545143c804b5a846b4bba1fa64761e26e77f225f56961fc63cc956023173ea9cd558c08f31b31541a88ab84e

Malware Config

Targets

    • Target

      6d2f1a98b77181cb675c0f3cd3ae6824fdd90e150c46d6fcee0ed16f7cd855df

    • Size

      2.3MB

    • MD5

      751be7e898d61998e52402b813e391bf

    • SHA1

      6b8572889dbac9938e8552f05bf57496b6ab0367

    • SHA256

      6d2f1a98b77181cb675c0f3cd3ae6824fdd90e150c46d6fcee0ed16f7cd855df

    • SHA512

      baa23385c716c6fc682fad2ba963b55c957101d7545143c804b5a846b4bba1fa64761e26e77f225f56961fc63cc956023173ea9cd558c08f31b31541a88ab84e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks