General

  • Target

    f5b4c4a0edaf3db073165aaf9174e30daee1898180fec315258ad55e71e4903cN

  • Size

    206KB

  • Sample

    241030-kc5t3s1lap

  • MD5

    2f8441bc4045d18e7d474b1df005b570

  • SHA1

    000e2f70084f4c26163603f7099f1f172a903566

  • SHA256

    f5b4c4a0edaf3db073165aaf9174e30daee1898180fec315258ad55e71e4903c

  • SHA512

    4c7ef5504862ed94ae5cfdb2380cc47ef99c9cdf0225e49dbafa228040b28214ba46b93414f24e8b80e1ec865278c1477b5b87d74a8594777bec268ed61315ab

  • SSDEEP

    1536:NdF6Y9JIXfLrhoCMI7C98AIaAekdAGDYEasJqkUssXOcfaAJzYU4r/1CbSYlIePV:NR2FoCMI2aAIam1asJjUfFOderYRHQ

Malware Config

Targets

    • Target

      f5b4c4a0edaf3db073165aaf9174e30daee1898180fec315258ad55e71e4903cN

    • Size

      206KB

    • MD5

      2f8441bc4045d18e7d474b1df005b570

    • SHA1

      000e2f70084f4c26163603f7099f1f172a903566

    • SHA256

      f5b4c4a0edaf3db073165aaf9174e30daee1898180fec315258ad55e71e4903c

    • SHA512

      4c7ef5504862ed94ae5cfdb2380cc47ef99c9cdf0225e49dbafa228040b28214ba46b93414f24e8b80e1ec865278c1477b5b87d74a8594777bec268ed61315ab

    • SSDEEP

      1536:NdF6Y9JIXfLrhoCMI7C98AIaAekdAGDYEasJqkUssXOcfaAJzYU4r/1CbSYlIePV:NR2FoCMI2aAIam1asJjUfFOderYRHQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks