General

  • Target

    1e0fa172f8e8c36eb9dd901a10775bef1fa6eaa0948511f441a11a41b725673d

  • Size

    1003KB

  • Sample

    221127-jth6zabb88

  • MD5

    85c004bf3ab8cf01662cb288ea9ae5db

  • SHA1

    d3e547ca0ff0016d26f2fe195590c4c50a986aac

  • SHA256

    1e0fa172f8e8c36eb9dd901a10775bef1fa6eaa0948511f441a11a41b725673d

  • SHA512

    b2e253c33cf99c9643866cd15be67a196dcc94072def82ec22355d16e76dcb002b364e3a909b39ae1548253d0eaf992dcc86aa57ed0a708ebee331530ec39633

  • SSDEEP

    12288:OhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4auFm:eRmJkcoQricOIQxiZY1iauFm

Malware Config

Targets

    • Target

      1e0fa172f8e8c36eb9dd901a10775bef1fa6eaa0948511f441a11a41b725673d

    • Size

      1003KB

    • MD5

      85c004bf3ab8cf01662cb288ea9ae5db

    • SHA1

      d3e547ca0ff0016d26f2fe195590c4c50a986aac

    • SHA256

      1e0fa172f8e8c36eb9dd901a10775bef1fa6eaa0948511f441a11a41b725673d

    • SHA512

      b2e253c33cf99c9643866cd15be67a196dcc94072def82ec22355d16e76dcb002b364e3a909b39ae1548253d0eaf992dcc86aa57ed0a708ebee331530ec39633

    • SSDEEP

      12288:OhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4auFm:eRmJkcoQricOIQxiZY1iauFm

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks