General

  • Target

    e18242f6ff524b246ae8d58a5051fd48380683c4cf46d2253b0ab0dc87c6b134

  • Size

    112KB

  • Sample

    221124-lljhwaed34

  • MD5

    77dcdc1d78522d71f7a32710064d2380

  • SHA1

    8f0620f9cf155d9632698789bdc5e5508f4907f9

  • SHA256

    e18242f6ff524b246ae8d58a5051fd48380683c4cf46d2253b0ab0dc87c6b134

  • SHA512

    c66cacc109b131b961d9aa40ef9e0f233e23a5712f9fc1d8f212fbea3312e623c3454169ffd70e365b23a5790e92ad1f243f4ad1cd143a3b2eac882807b5a17e

  • SSDEEP

    3072:5+k1ahltUt4C/8qp4BHS25zPHHniYQLd5EZQ/3:1ytUtb/NUjzvHIEO/

Malware Config

Targets

    • Target

      e18242f6ff524b246ae8d58a5051fd48380683c4cf46d2253b0ab0dc87c6b134

    • Size

      112KB

    • MD5

      77dcdc1d78522d71f7a32710064d2380

    • SHA1

      8f0620f9cf155d9632698789bdc5e5508f4907f9

    • SHA256

      e18242f6ff524b246ae8d58a5051fd48380683c4cf46d2253b0ab0dc87c6b134

    • SHA512

      c66cacc109b131b961d9aa40ef9e0f233e23a5712f9fc1d8f212fbea3312e623c3454169ffd70e365b23a5790e92ad1f243f4ad1cd143a3b2eac882807b5a17e

    • SSDEEP

      3072:5+k1ahltUt4C/8qp4BHS25zPHHniYQLd5EZQ/3:1ytUtb/NUjzvHIEO/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks