General

  • Target

    b9cd9b89857de9e9226dcc8c4173c85e_JaffaCakes118

  • Size

    822KB

  • Sample

    241202-x6hb4aymfy

  • MD5

    b9cd9b89857de9e9226dcc8c4173c85e

  • SHA1

    0e50b9b2681924a58fa50e00a10d1584b018bdd9

  • SHA256

    a852d02a9157ffda3feda83d70b5ae540658a28eac5b4b7c198ee7d5ca2a00a0

  • SHA512

    335d17802e1c9759edc9a88e4ed27aa5ad23f114b610296d1a0d9dda0fb10d52fc2c9cc24c18c70ce7add8ba0b6838137417f98611cbc12efa7a02166351b860

  • SSDEEP

    12288:lNldOGBTFbw0RJjJTQtOiQhjHfBHC9qISZKI54GqYdBKuf3NiAiSpb67GWoV87FY:floGBTL0szVi0IPI5dBKuvEVSQK984h

Malware Config

Targets

    • Target

      b9cd9b89857de9e9226dcc8c4173c85e_JaffaCakes118

    • Size

      822KB

    • MD5

      b9cd9b89857de9e9226dcc8c4173c85e

    • SHA1

      0e50b9b2681924a58fa50e00a10d1584b018bdd9

    • SHA256

      a852d02a9157ffda3feda83d70b5ae540658a28eac5b4b7c198ee7d5ca2a00a0

    • SHA512

      335d17802e1c9759edc9a88e4ed27aa5ad23f114b610296d1a0d9dda0fb10d52fc2c9cc24c18c70ce7add8ba0b6838137417f98611cbc12efa7a02166351b860

    • SSDEEP

      12288:lNldOGBTFbw0RJjJTQtOiQhjHfBHC9qISZKI54GqYdBKuf3NiAiSpb67GWoV87FY:floGBTL0szVi0IPI5dBKuvEVSQK984h

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks