General

  • Target

    3ae1ad6d75c07b757e298ba79acbe15f823bf3ed00d357c057dfb3378ace6b2f

  • Size

    205KB

  • Sample

    221125-c6fs2sac3s

  • MD5

    217c37a9830fd04892a495561d3a7f72

  • SHA1

    9fac66fccdc708242052aeea1c398b9cb8440d2a

  • SHA256

    3ae1ad6d75c07b757e298ba79acbe15f823bf3ed00d357c057dfb3378ace6b2f

  • SHA512

    9e47986c838cb484a1e0201d2679c6d7d4434ed3ce0e633116dd0fd5eb27ce850a2355ea46026f81b47c104f584c5dc6f442a194e84be9ea403ddeac5e790f77

  • SSDEEP

    3072:crkmYSqvuzcqGhFHmhNOKd6zwkwxUwHfy1r:GYPmcFmhswkwxUj

Malware Config

Targets

    • Target

      3ae1ad6d75c07b757e298ba79acbe15f823bf3ed00d357c057dfb3378ace6b2f

    • Size

      205KB

    • MD5

      217c37a9830fd04892a495561d3a7f72

    • SHA1

      9fac66fccdc708242052aeea1c398b9cb8440d2a

    • SHA256

      3ae1ad6d75c07b757e298ba79acbe15f823bf3ed00d357c057dfb3378ace6b2f

    • SHA512

      9e47986c838cb484a1e0201d2679c6d7d4434ed3ce0e633116dd0fd5eb27ce850a2355ea46026f81b47c104f584c5dc6f442a194e84be9ea403ddeac5e790f77

    • SSDEEP

      3072:crkmYSqvuzcqGhFHmhNOKd6zwkwxUwHfy1r:GYPmcFmhswkwxUj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks