General

  • Target

    2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210

  • Size

    882KB

  • Sample

    240929-hy8fzsxand

  • MD5

    b062843886327f817d7cefb5f611a15e

  • SHA1

    cdfab7d0a25683e0a5c78646f8ab01a66ce68b0a

  • SHA256

    2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210

  • SHA512

    15912eb2fc004c8b39b5b087c91b60554ca6c34e43ddf8688e8d36dac657c0186608142899d779e592ad24d38fc3314a10155175e0a3b9b5ece48d8d788c6d56

  • SSDEEP

    12288:G4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgahFWkq9MmCS:G4lavt0LkLL9IMixoEgeahFWkq9MmCS

Malware Config

Targets

    • Target

      2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210

    • Size

      882KB

    • MD5

      b062843886327f817d7cefb5f611a15e

    • SHA1

      cdfab7d0a25683e0a5c78646f8ab01a66ce68b0a

    • SHA256

      2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210

    • SHA512

      15912eb2fc004c8b39b5b087c91b60554ca6c34e43ddf8688e8d36dac657c0186608142899d779e592ad24d38fc3314a10155175e0a3b9b5ece48d8d788c6d56

    • SSDEEP

      12288:G4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgahFWkq9MmCS:G4lavt0LkLL9IMixoEgeahFWkq9MmCS

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks