General

  • Target

    3a0fdb8949f5f5783a0ef3009e71039fc74a0da5e691712cee4239ae9ce9f2ff

  • Size

    181KB

  • Sample

    221125-sf5x9afc53

  • MD5

    cee647a4ac53946dedff90ba3c406674

  • SHA1

    53ce72e3726de9c0eb4e6e6f7c569ac210c789e4

  • SHA256

    3a0fdb8949f5f5783a0ef3009e71039fc74a0da5e691712cee4239ae9ce9f2ff

  • SHA512

    9c728f58876ada1ce505f7780f71770d6b467222bf28b3a316c4053e50413f77d2aa78b59b5642a80acf1caeaba98133b30354e07b2ab2262488c1a962b0de73

  • SSDEEP

    3072:y7lUBMjrEoqCZbI3//Be/elqW3jcrrI0m0JGLUPiV8+/PgsGHDY+TM0DSKk:C2Or9Pk3/JxlpKI0ByUPiV8+AsGHDY+L

Malware Config

Targets

    • Target

      3a0fdb8949f5f5783a0ef3009e71039fc74a0da5e691712cee4239ae9ce9f2ff

    • Size

      181KB

    • MD5

      cee647a4ac53946dedff90ba3c406674

    • SHA1

      53ce72e3726de9c0eb4e6e6f7c569ac210c789e4

    • SHA256

      3a0fdb8949f5f5783a0ef3009e71039fc74a0da5e691712cee4239ae9ce9f2ff

    • SHA512

      9c728f58876ada1ce505f7780f71770d6b467222bf28b3a316c4053e50413f77d2aa78b59b5642a80acf1caeaba98133b30354e07b2ab2262488c1a962b0de73

    • SSDEEP

      3072:y7lUBMjrEoqCZbI3//Be/elqW3jcrrI0m0JGLUPiV8+/PgsGHDY+TM0DSKk:C2Or9Pk3/JxlpKI0ByUPiV8+AsGHDY+L

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks