General

  • Target

    fbfab3f0db5067f3e8aae218d5752c3a_JaffaCakes118

  • Size

    295KB

  • Sample

    240420-fmsv2shb46

  • MD5

    fbfab3f0db5067f3e8aae218d5752c3a

  • SHA1

    4112713473652324d65554aad800fc159c45a4e6

  • SHA256

    85c2d210b1aecb5743c097ef93941ed5383d11df0a18f8303437906bed8f02e8

  • SHA512

    ab781b73fbb3e8c1ad04a5fbba415a5deebfd7bac391f3ae30c4f7ce078d5ecc083ff7ed39778efe67d6cbc93610c967054f5621ff6c0f8c70f5a1a16117fa5e

  • SSDEEP

    3072:gyNx+ONJItfWA3VqDO3+YCYkQZOr/V8Z451u/WCWoTrAyA8kzNYQdrsjA7WGpyPb:FNxPYfWA4jYfoL

Malware Config

Targets

    • Target

      fbfab3f0db5067f3e8aae218d5752c3a_JaffaCakes118

    • Size

      295KB

    • MD5

      fbfab3f0db5067f3e8aae218d5752c3a

    • SHA1

      4112713473652324d65554aad800fc159c45a4e6

    • SHA256

      85c2d210b1aecb5743c097ef93941ed5383d11df0a18f8303437906bed8f02e8

    • SHA512

      ab781b73fbb3e8c1ad04a5fbba415a5deebfd7bac391f3ae30c4f7ce078d5ecc083ff7ed39778efe67d6cbc93610c967054f5621ff6c0f8c70f5a1a16117fa5e

    • SSDEEP

      3072:gyNx+ONJItfWA3VqDO3+YCYkQZOr/V8Z451u/WCWoTrAyA8kzNYQdrsjA7WGpyPb:FNxPYfWA4jYfoL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks