General

  • Target

    6d9e7dfe7232852fa11e10c22a0a3ca2_JaffaCakes118

  • Size

    713KB

  • Sample

    240524-hc8jvsgf4x

  • MD5

    6d9e7dfe7232852fa11e10c22a0a3ca2

  • SHA1

    3054b9b8e28937b14cc600496adf3f92d44578db

  • SHA256

    f2540977c3b34608047c4b11a8ccd30ab01674e1d9a2d93290447e683f4d0b3e

  • SHA512

    aeec0d0d1dd863fae3adafbc4589c4f49af1addb14d29e2d0a85815e68609ccea66e27d532e154568ff466ce984f9392b907d6875e359304defe5256a45e4970

  • SSDEEP

    6144:SsH4OjsU9q5eYEkRvPbD1r42soGOaWUcOf6mwR:SI49QYtvv1rarWWwR

Malware Config

Targets

    • Target

      6d9e7dfe7232852fa11e10c22a0a3ca2_JaffaCakes118

    • Size

      713KB

    • MD5

      6d9e7dfe7232852fa11e10c22a0a3ca2

    • SHA1

      3054b9b8e28937b14cc600496adf3f92d44578db

    • SHA256

      f2540977c3b34608047c4b11a8ccd30ab01674e1d9a2d93290447e683f4d0b3e

    • SHA512

      aeec0d0d1dd863fae3adafbc4589c4f49af1addb14d29e2d0a85815e68609ccea66e27d532e154568ff466ce984f9392b907d6875e359304defe5256a45e4970

    • SSDEEP

      6144:SsH4OjsU9q5eYEkRvPbD1r42soGOaWUcOf6mwR:SI49QYtvv1rarWWwR

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks