General

  • Target

    9b44ccb6e01dd9a3e020e0dbd26a6d8804fa882729cad3f95dfe2705337aaa0c

  • Size

    111KB

  • Sample

    221124-gdg8mafd4y

  • MD5

    7f06af4daf30a10baa152fdc52a3680d

  • SHA1

    378fc79c50bb028781b907d84a2bab105673e801

  • SHA256

    9b44ccb6e01dd9a3e020e0dbd26a6d8804fa882729cad3f95dfe2705337aaa0c

  • SHA512

    84b26c0155374a2a93dfaae5ccc615a1f02a92f5fe276140163f108ddf69be703a0886484239ba1b29ab6e9a276df0ffbc0a9aadfdb75c2b33cd799ae2826362

  • SSDEEP

    3072:tM/LO9qCD8qD81rxA1647lFFainRuAHNPRa0qN1h:SCderOGYmX

Malware Config

Targets

    • Target

      9b44ccb6e01dd9a3e020e0dbd26a6d8804fa882729cad3f95dfe2705337aaa0c

    • Size

      111KB

    • MD5

      7f06af4daf30a10baa152fdc52a3680d

    • SHA1

      378fc79c50bb028781b907d84a2bab105673e801

    • SHA256

      9b44ccb6e01dd9a3e020e0dbd26a6d8804fa882729cad3f95dfe2705337aaa0c

    • SHA512

      84b26c0155374a2a93dfaae5ccc615a1f02a92f5fe276140163f108ddf69be703a0886484239ba1b29ab6e9a276df0ffbc0a9aadfdb75c2b33cd799ae2826362

    • SSDEEP

      3072:tM/LO9qCD8qD81rxA1647lFFainRuAHNPRa0qN1h:SCderOGYmX

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks