General

  • Target

    ea78e84b66500f8387f6acbdb0c6daee5fabc441601b16f89e96369f2a27f28f

  • Size

    337KB

  • Sample

    240420-e1zebahb9t

  • MD5

    d4d41d8698a2db804b24031ab74a78c5

  • SHA1

    8952b815724d5d0b346afcbd78aeaa720d9148d3

  • SHA256

    ea78e84b66500f8387f6acbdb0c6daee5fabc441601b16f89e96369f2a27f28f

  • SHA512

    b806d6e13eec57c0b1e911d2c9110c267d38ea2afffbad5c3eb9f49ab0f67760cee4b2fe8c5c6a402cef0633dc62d4cde6e2fa97fe3fdf43e2c25b2334d9662e

  • SSDEEP

    3072:bRtCqW22UNsDQloeJgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:bfJsPQlJJ1+fIyG5jZkCwi8r

Malware Config

Targets

    • Target

      ea78e84b66500f8387f6acbdb0c6daee5fabc441601b16f89e96369f2a27f28f

    • Size

      337KB

    • MD5

      d4d41d8698a2db804b24031ab74a78c5

    • SHA1

      8952b815724d5d0b346afcbd78aeaa720d9148d3

    • SHA256

      ea78e84b66500f8387f6acbdb0c6daee5fabc441601b16f89e96369f2a27f28f

    • SHA512

      b806d6e13eec57c0b1e911d2c9110c267d38ea2afffbad5c3eb9f49ab0f67760cee4b2fe8c5c6a402cef0633dc62d4cde6e2fa97fe3fdf43e2c25b2334d9662e

    • SSDEEP

      3072:bRtCqW22UNsDQloeJgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:bfJsPQlJJ1+fIyG5jZkCwi8r

    • Adds autorun key to be loaded by Explorer.exe on startup

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks