General

  • Target

    Setup.exe

  • Size

    224KB

  • Sample

    230921-k1hpfsha35

  • MD5

    f79f52b0bfe45c9639a0228a30e1f7ad

  • SHA1

    f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

  • SHA256

    3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

  • SHA512

    4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

  • SSDEEP

    3072:yKsgyqI/cLLjGK0w7BSvwS24YGnFYYLd12rABAQnW49AMADn/Yh:V5Gw7EvwkXnFYC2r4dW49

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      224KB

    • MD5

      f79f52b0bfe45c9639a0228a30e1f7ad

    • SHA1

      f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

    • SHA256

      3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

    • SHA512

      4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

    • SSDEEP

      3072:yKsgyqI/cLLjGK0w7BSvwS24YGnFYYLd12rABAQnW49AMADn/Yh:V5Gw7EvwkXnFYC2r4dW49

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks