General

  • Target

    a4e810d15491dd0d381e6846ef18d89d41d351b3995d8ddc9bc68b68d739506e

  • Size

    443KB

  • Sample

    221125-h5tw6sae95

  • MD5

    21b7aa9ee2bf500e086236044c072e95

  • SHA1

    f2f6e913df46609733c6b60e1b463a729c4d5a14

  • SHA256

    a4e810d15491dd0d381e6846ef18d89d41d351b3995d8ddc9bc68b68d739506e

  • SHA512

    ce038c09e26d10dbbecdb4e09f84450ae55794e9b1fb0cf113106c8a3cb420ed3983baed9b35384f0fba09842416230515bdcabbe4b7cbf0891b9a377faf5984

  • SSDEEP

    6144:iybSKuA7VgHTXmFvmrDJR+fueWf6z7JlEaX7UL7kz:iybSOWHTgIIWf6zXbU

Malware Config

Targets

    • Target

      a4e810d15491dd0d381e6846ef18d89d41d351b3995d8ddc9bc68b68d739506e

    • Size

      443KB

    • MD5

      21b7aa9ee2bf500e086236044c072e95

    • SHA1

      f2f6e913df46609733c6b60e1b463a729c4d5a14

    • SHA256

      a4e810d15491dd0d381e6846ef18d89d41d351b3995d8ddc9bc68b68d739506e

    • SHA512

      ce038c09e26d10dbbecdb4e09f84450ae55794e9b1fb0cf113106c8a3cb420ed3983baed9b35384f0fba09842416230515bdcabbe4b7cbf0891b9a377faf5984

    • SSDEEP

      6144:iybSKuA7VgHTXmFvmrDJR+fueWf6z7JlEaX7UL7kz:iybSOWHTgIIWf6zXbU

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks