General

  • Target

    de427ba0777d40f72357e9c85fd0b0a6b6ba74fcb3194790940099ecd2d7d3d6

  • Size

    724KB

  • Sample

    220122-alyf9aeee2

  • MD5

    facb2f0ee8f250e085e7a5f9b714a26d

  • SHA1

    ea87654b2bd00ef696b74a1b21f98de681cd49bf

  • SHA256

    de427ba0777d40f72357e9c85fd0b0a6b6ba74fcb3194790940099ecd2d7d3d6

  • SHA512

    e1f459387b9f573e905f07d806b911066d9b70c22dc3ee433116ee7c53f98f7463e246480b3c060a38cda1dffb5ed3b393961096acc7688d1c8e4b277e8e6f00

Malware Config

Targets

    • Target

      de427ba0777d40f72357e9c85fd0b0a6b6ba74fcb3194790940099ecd2d7d3d6

    • Size

      724KB

    • MD5

      facb2f0ee8f250e085e7a5f9b714a26d

    • SHA1

      ea87654b2bd00ef696b74a1b21f98de681cd49bf

    • SHA256

      de427ba0777d40f72357e9c85fd0b0a6b6ba74fcb3194790940099ecd2d7d3d6

    • SHA512

      e1f459387b9f573e905f07d806b911066d9b70c22dc3ee433116ee7c53f98f7463e246480b3c060a38cda1dffb5ed3b393961096acc7688d1c8e4b277e8e6f00

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks