General

  • Target

    a16047a43de04f8c9dd254cd39b37421.exe

  • Size

    157KB

  • Sample

    211206-dwba9adccq

  • MD5

    a16047a43de04f8c9dd254cd39b37421

  • SHA1

    50cbe1b1a361fa7adc54c7c75a6d8b9248a889b4

  • SHA256

    8859685e5de4d1fdab2dbbfa6899ccb8bbf1b8fb859abf129be79b19b0b87314

  • SHA512

    adda28438e09d951ce22cf926eefafc64348a68ff513d82618b98b3c8f1aa4a979f8987861c7f916bcad39a94a5a40c77dad5f3cd91943378335a53c849eb527

Malware Config

Targets

    • Target

      a16047a43de04f8c9dd254cd39b37421.exe

    • Size

      157KB

    • MD5

      a16047a43de04f8c9dd254cd39b37421

    • SHA1

      50cbe1b1a361fa7adc54c7c75a6d8b9248a889b4

    • SHA256

      8859685e5de4d1fdab2dbbfa6899ccb8bbf1b8fb859abf129be79b19b0b87314

    • SHA512

      adda28438e09d951ce22cf926eefafc64348a68ff513d82618b98b3c8f1aa4a979f8987861c7f916bcad39a94a5a40c77dad5f3cd91943378335a53c849eb527

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks