General

  • Target

    b324d5c2bee5030375b8e19b3e1c471ecff6a3c49fcec6938e2acb3e81bfaf0d

  • Size

    72KB

  • Sample

    221128-xyamaaeb3t

  • MD5

    f153785b749ab24f04b91bdd7a27b518

  • SHA1

    cceafdded799e67ab690b4b81ded52afdd50f5cc

  • SHA256

    b324d5c2bee5030375b8e19b3e1c471ecff6a3c49fcec6938e2acb3e81bfaf0d

  • SHA512

    fe0a32ec3563d24ebfeee7c041954892161b28b36b4841598c4de0c38096a036edcd91d37cd1c3332a976537782bd3cb74fd4d317d20329f2297765ca9e8eaf6

  • SSDEEP

    1536:FP7LRKwpWl+lzjSE/u3E1m/HX9dzb+m9L+27s:lo6jSEfwfX9dzDS27s

Malware Config

Targets

    • Target

      b324d5c2bee5030375b8e19b3e1c471ecff6a3c49fcec6938e2acb3e81bfaf0d

    • Size

      72KB

    • MD5

      f153785b749ab24f04b91bdd7a27b518

    • SHA1

      cceafdded799e67ab690b4b81ded52afdd50f5cc

    • SHA256

      b324d5c2bee5030375b8e19b3e1c471ecff6a3c49fcec6938e2acb3e81bfaf0d

    • SHA512

      fe0a32ec3563d24ebfeee7c041954892161b28b36b4841598c4de0c38096a036edcd91d37cd1c3332a976537782bd3cb74fd4d317d20329f2297765ca9e8eaf6

    • SSDEEP

      1536:FP7LRKwpWl+lzjSE/u3E1m/HX9dzb+m9L+27s:lo6jSEfwfX9dzDS27s

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks