General

  • Target

    ce99437aca8f29cb5e6ac392b376456be01fd3ce5b7820f0647d5f5f363c1f93N

  • Size

    36KB

  • Sample

    241001-fsaawssbll

  • MD5

    93e930cadd8eadca42a73e0abedf1d60

  • SHA1

    7507ba75071929c81e4ebf84b60755a5acfb9148

  • SHA256

    ce99437aca8f29cb5e6ac392b376456be01fd3ce5b7820f0647d5f5f363c1f93

  • SHA512

    a60cbd59af079f4852f7e1cef7da9405a294eb70bc5e75eb279eb7d9b1273c5818e5f3349205c0be5c639bb17d5bf667f10036cd52447abf225f38dec2272e8b

  • SSDEEP

    768:VOSkaDm6H8T3q+8cUTizxI/MJsEhq5lxOBcmZPt06PjC:VOSkaDFu3q+8cUTi+/V5lxOWmM62

Malware Config

Targets

    • Target

      ce99437aca8f29cb5e6ac392b376456be01fd3ce5b7820f0647d5f5f363c1f93N

    • Size

      36KB

    • MD5

      93e930cadd8eadca42a73e0abedf1d60

    • SHA1

      7507ba75071929c81e4ebf84b60755a5acfb9148

    • SHA256

      ce99437aca8f29cb5e6ac392b376456be01fd3ce5b7820f0647d5f5f363c1f93

    • SHA512

      a60cbd59af079f4852f7e1cef7da9405a294eb70bc5e75eb279eb7d9b1273c5818e5f3349205c0be5c639bb17d5bf667f10036cd52447abf225f38dec2272e8b

    • SSDEEP

      768:VOSkaDm6H8T3q+8cUTizxI/MJsEhq5lxOBcmZPt06PjC:VOSkaDFu3q+8cUTi+/V5lxOWmM62

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks