Resubmissions

28-06-2022 07:48

220628-jnhcgsfhgl 10

28-06-2022 07:47

220628-jmym3sfhfr 1

General

  • Target

    https://disk.yandex.ru/d/5NH_1KPqoHXYFw

  • Sample

    220628-jnhcgsfhgl

Malware Config

Targets

    • Target

      https://disk.yandex.ru/d/5NH_1KPqoHXYFw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks