General

  • Target

    481df2d1bb42c75a91ad8a3fe9d1851ba3d05080d3d901101cc994f3040b6469N.exe

  • Size

    56KB

  • Sample

    250119-pb8a2awqbv

  • MD5

    4b6b9b9078efdea1d767e1bb8076e570

  • SHA1

    2cefdc00441bab34f9026172fc4d19c15059b5c5

  • SHA256

    481df2d1bb42c75a91ad8a3fe9d1851ba3d05080d3d901101cc994f3040b6469

  • SHA512

    a38c4d9576e6f15341900a1e75057c0e0cc078ee3b3a8ce529a158d494c3a8067f79ba90f85d8a8d591c497a96130a451395efbafd087fc347e29fbd9b57188d

  • SSDEEP

    1536:XvvqylRHMH/Jtakr8KCxEhDYcEb08+D9V2vPscW:fvVa+krSxuDIvi9+Psb

Malware Config

Targets

    • Target

      481df2d1bb42c75a91ad8a3fe9d1851ba3d05080d3d901101cc994f3040b6469N.exe

    • Size

      56KB

    • MD5

      4b6b9b9078efdea1d767e1bb8076e570

    • SHA1

      2cefdc00441bab34f9026172fc4d19c15059b5c5

    • SHA256

      481df2d1bb42c75a91ad8a3fe9d1851ba3d05080d3d901101cc994f3040b6469

    • SHA512

      a38c4d9576e6f15341900a1e75057c0e0cc078ee3b3a8ce529a158d494c3a8067f79ba90f85d8a8d591c497a96130a451395efbafd087fc347e29fbd9b57188d

    • SSDEEP

      1536:XvvqylRHMH/Jtakr8KCxEhDYcEb08+D9V2vPscW:fvVa+krSxuDIvi9+Psb

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks