General

  • Target

    9c1ad6aeb064c615267597bdd27e8cc0f0b8d3b4a96437b6dffdc5dc3fc27564

  • Size

    156KB

  • Sample

    220520-3rwttshde5

  • MD5

    155f99e5dd86820942fa5e1f05ae1bbe

  • SHA1

    65100fad9ea9e59ece5ac703a0ee60ae8440245c

  • SHA256

    9c1ad6aeb064c615267597bdd27e8cc0f0b8d3b4a96437b6dffdc5dc3fc27564

  • SHA512

    29d0286b6714e32e4d82ececfe9e9730c4c51c76b443291dce0c911b7299664e6e16a58cc833a4f259fa8d432bc66beb2b7d04a0676515a30e5c9d70b11333ad

Malware Config

Targets

    • Target

      9c1ad6aeb064c615267597bdd27e8cc0f0b8d3b4a96437b6dffdc5dc3fc27564

    • Size

      156KB

    • MD5

      155f99e5dd86820942fa5e1f05ae1bbe

    • SHA1

      65100fad9ea9e59ece5ac703a0ee60ae8440245c

    • SHA256

      9c1ad6aeb064c615267597bdd27e8cc0f0b8d3b4a96437b6dffdc5dc3fc27564

    • SHA512

      29d0286b6714e32e4d82ececfe9e9730c4c51c76b443291dce0c911b7299664e6e16a58cc833a4f259fa8d432bc66beb2b7d04a0676515a30e5c9d70b11333ad

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks