General

  • Target

    fb855f990c9d0bbb6b344686ff133ae8_JaffaCakes118

  • Size

    312KB

  • Sample

    240420-aw9l9sce3t

  • MD5

    fb855f990c9d0bbb6b344686ff133ae8

  • SHA1

    6cd1c7480d59466b5ad748c951b450cfab419a4a

  • SHA256

    eec1b7920c6077967531e3c86b5092a609e3c678290fa532995a921962aa94fe

  • SHA512

    75203e815e471eff64da20675819f3f800ef0a82e624a67dc3940bb85e338d83fd86d93608b806ba5753e53c7c488cbe488796b4ce7aa39266527a269f6f3035

  • SSDEEP

    6144:5ioQFl9LBX+qglbe8r7Fg9UIox0O5TzrXjZq/:5ioYJX+BVFe/cTzbj

Malware Config

Targets

    • Target

      fb855f990c9d0bbb6b344686ff133ae8_JaffaCakes118

    • Size

      312KB

    • MD5

      fb855f990c9d0bbb6b344686ff133ae8

    • SHA1

      6cd1c7480d59466b5ad748c951b450cfab419a4a

    • SHA256

      eec1b7920c6077967531e3c86b5092a609e3c678290fa532995a921962aa94fe

    • SHA512

      75203e815e471eff64da20675819f3f800ef0a82e624a67dc3940bb85e338d83fd86d93608b806ba5753e53c7c488cbe488796b4ce7aa39266527a269f6f3035

    • SSDEEP

      6144:5ioQFl9LBX+qglbe8r7Fg9UIox0O5TzrXjZq/:5ioYJX+BVFe/cTzbj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks