General

  • Target

    e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f

  • Size

    8.4MB

  • Sample

    211215-wy3sdsbbdp

  • MD5

    fc878a1e87addcfc819a738f2f4b58f0

  • SHA1

    3fe62a9844037951adda9aab5ce952b941033288

  • SHA256

    e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f

  • SHA512

    71da98d1086e4a8754d03592266e513e27a8ec4b8e252a7ca24a9278cd8eb0ed61d062a9a1b8f6b3b158c6f2b3465a1088e5b415feabf95a88f00d677ddd06e9

Malware Config

Targets

    • Target

      e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f

    • Size

      8.4MB

    • MD5

      fc878a1e87addcfc819a738f2f4b58f0

    • SHA1

      3fe62a9844037951adda9aab5ce952b941033288

    • SHA256

      e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f

    • SHA512

      71da98d1086e4a8754d03592266e513e27a8ec4b8e252a7ca24a9278cd8eb0ed61d062a9a1b8f6b3b158c6f2b3465a1088e5b415feabf95a88f00d677ddd06e9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks