Resubmissions

13-10-2024 22:09

241013-12yp3a1epg 8

23-09-2024 20:35

240923-zc965azepm 3

23-09-2024 20:33

240923-zb633szenn 3

23-09-2024 20:28

240923-y81f5atdmc 10

23-09-2024 20:27

240923-y8sraatdlg 3

23-09-2024 20:27

240923-y8jtdatdlb 3

23-09-2024 20:26

240923-y8b4jazekn 3

23-09-2024 20:22

240923-y51mqazdpr 8

23-09-2024 20:22

240923-y5sbcatcph 4

General

  • Target

    sample

  • Size

    12KB

  • Sample

    240923-y81f5atdmc

  • MD5

    0b12663e5ae87a93a8726d938ef5bbf8

  • SHA1

    b53628d0d6db63fc3628146e901fa2ddca94b46d

  • SHA256

    6643f151aed8a65e60aafdd8ed1df99f4142b3cf4ac8f4f2ef41eb88070b13d8

  • SHA512

    9c3d34c587154bad94db1e4084f90f4d6415b7d8869293b74ab1cafb70021a12463fd1f1909ac06ed7407b062fcad33212769f018710081c9729417c59bb7f70

  • SSDEEP

    192:/NX6Gj50qTgymlrU4yD8Idlueh0ng61u+NmRmE5lw23WXX:/mzlrUhD8Idlu2SgT5u2w

Malware Config

Targets

    • Target

      sample

    • Size

      12KB

    • MD5

      0b12663e5ae87a93a8726d938ef5bbf8

    • SHA1

      b53628d0d6db63fc3628146e901fa2ddca94b46d

    • SHA256

      6643f151aed8a65e60aafdd8ed1df99f4142b3cf4ac8f4f2ef41eb88070b13d8

    • SHA512

      9c3d34c587154bad94db1e4084f90f4d6415b7d8869293b74ab1cafb70021a12463fd1f1909ac06ed7407b062fcad33212769f018710081c9729417c59bb7f70

    • SSDEEP

      192:/NX6Gj50qTgymlrU4yD8Idlueh0ng61u+NmRmE5lw23WXX:/mzlrUhD8Idlu2SgT5u2w

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks