General

  • Target

    4d0579d4d70275cf5688f3fcb7af8ce1cf014bd4ed4ad56ab795e0df9e10d88b

  • Size

    337KB

  • Sample

    240419-z6zx9afh48

  • MD5

    18beff71e78a8ce0e8d8d56eec4562c4

  • SHA1

    41c88e6f2378c8f4162b03d84fa2ee5179398637

  • SHA256

    4d0579d4d70275cf5688f3fcb7af8ce1cf014bd4ed4ad56ab795e0df9e10d88b

  • SHA512

    83557b4247bc6c666771caafe7dbeca6bed5d901180b27857e5271bc1217f8bab2db49aab15083f349fa22443ea0a9d0cc2c67d7caae4a8ec0b18220853a6d1c

  • SSDEEP

    3072:0GEzkMZ0eLgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:0/om0eL1+fIyG5jZkCwi8r

Malware Config

Targets

    • Target

      4d0579d4d70275cf5688f3fcb7af8ce1cf014bd4ed4ad56ab795e0df9e10d88b

    • Size

      337KB

    • MD5

      18beff71e78a8ce0e8d8d56eec4562c4

    • SHA1

      41c88e6f2378c8f4162b03d84fa2ee5179398637

    • SHA256

      4d0579d4d70275cf5688f3fcb7af8ce1cf014bd4ed4ad56ab795e0df9e10d88b

    • SHA512

      83557b4247bc6c666771caafe7dbeca6bed5d901180b27857e5271bc1217f8bab2db49aab15083f349fa22443ea0a9d0cc2c67d7caae4a8ec0b18220853a6d1c

    • SSDEEP

      3072:0GEzkMZ0eLgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:0/om0eL1+fIyG5jZkCwi8r

    • Adds autorun key to be loaded by Explorer.exe on startup

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks