General

  • Target

    8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded

  • Size

    63KB

  • Sample

    221124-ezl3laca9z

  • MD5

    f4d951691263d76bba6b791af761487a

  • SHA1

    5ba092de55213130d45453ce70569b6d8f67e65e

  • SHA256

    8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded

  • SHA512

    f3d330788086ba96bf65bbc1498bf3cb83cb79f9088fa1ebd6c3a140b7a98192bc7c821c7207fcebb47c7dbdba00a062c84039239ed4a5ae1e37d19db3453e15

  • SSDEEP

    1536:8dDFXXwqEcPpa+54aNEIaYnmGN6eyA37VXy:8dDFXXwWhaU4aGxYpN6HALVXy

Malware Config

Targets

    • Target

      8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded

    • Size

      63KB

    • MD5

      f4d951691263d76bba6b791af761487a

    • SHA1

      5ba092de55213130d45453ce70569b6d8f67e65e

    • SHA256

      8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded

    • SHA512

      f3d330788086ba96bf65bbc1498bf3cb83cb79f9088fa1ebd6c3a140b7a98192bc7c821c7207fcebb47c7dbdba00a062c84039239ed4a5ae1e37d19db3453e15

    • SSDEEP

      1536:8dDFXXwqEcPpa+54aNEIaYnmGN6eyA37VXy:8dDFXXwWhaU4aGxYpN6HALVXy

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks