General

  • Target

    556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11

  • Size

    41KB

  • Sample

    221123-vqa7qshf66

  • MD5

    ac4cefd985abf452eb08bdfb8a2f77c7

  • SHA1

    fe77f66e7a2202e586bbfc45153f9c54c4d15a4b

  • SHA256

    556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11

  • SHA512

    e706a6ab561aeb18f37e37a56a761249d3a0a3709e77077d8f2aee6a309f0d5e9a6c33ef92e96d97101467b90ee3177b0f4b7c8a93d618cd4586bde3f73819cc

  • SSDEEP

    768:nZq4YO4rJjDcmhQ0L1bbC2VLL60Mjtur:nINrJUmhHbC+SM

Malware Config

Targets

    • Target

      556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11

    • Size

      41KB

    • MD5

      ac4cefd985abf452eb08bdfb8a2f77c7

    • SHA1

      fe77f66e7a2202e586bbfc45153f9c54c4d15a4b

    • SHA256

      556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11

    • SHA512

      e706a6ab561aeb18f37e37a56a761249d3a0a3709e77077d8f2aee6a309f0d5e9a6c33ef92e96d97101467b90ee3177b0f4b7c8a93d618cd4586bde3f73819cc

    • SSDEEP

      768:nZq4YO4rJjDcmhQ0L1bbC2VLL60Mjtur:nINrJUmhHbC+SM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks