General

  • Target

    aebe14fe1dfbd89848f51831dc53f2e0df55908783959b57eec070c2a1ddc98c

  • Size

    383KB

  • Sample

    221126-klkkhaab2x

  • MD5

    ee67fdd8f9b5dffe1d0d123caf3032f7

  • SHA1

    a8adc23fae4182ec697f0bf313e5f6a35a7fb938

  • SHA256

    aebe14fe1dfbd89848f51831dc53f2e0df55908783959b57eec070c2a1ddc98c

  • SHA512

    0b72f4eaec920a45672ec3463075adc9f92fcfb694694362fbdfb807b9e4af2222a06ac8c472ea5449e8d154b2e739f0e1867986236614336cd0b2351123a391

  • SSDEEP

    6144:lvLnQs/GKl8uHsdcPZBKsthXOb5klzPYbT9l4:MUBRXOb5klzPYbT9l

Malware Config

Targets

    • Target

      aebe14fe1dfbd89848f51831dc53f2e0df55908783959b57eec070c2a1ddc98c

    • Size

      383KB

    • MD5

      ee67fdd8f9b5dffe1d0d123caf3032f7

    • SHA1

      a8adc23fae4182ec697f0bf313e5f6a35a7fb938

    • SHA256

      aebe14fe1dfbd89848f51831dc53f2e0df55908783959b57eec070c2a1ddc98c

    • SHA512

      0b72f4eaec920a45672ec3463075adc9f92fcfb694694362fbdfb807b9e4af2222a06ac8c472ea5449e8d154b2e739f0e1867986236614336cd0b2351123a391

    • SSDEEP

      6144:lvLnQs/GKl8uHsdcPZBKsthXOb5klzPYbT9l4:MUBRXOb5klzPYbT9l

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks