gptkbp:instanceOf
|
Remote Access Trojan
|
gptkbp:abilities
|
Command execution
Credential theft
File transfer
Keylogging
Remote desktop control
Webcam access
|
gptkbp:alsoKnownAs
|
gptkb:Bladabindi
|
gptkbp:category
|
gptkb:Remote_Administration_Tool
Trojan
Keylogger
Spyware
|
gptkbp:controls
|
Command and Control server
|
gptkbp:detects
|
gptkb:Avast
gptkb:Kaspersky
gptkb:Malwarebytes
gptkb:ESET
gptkb:Bitdefender
gptkb:Symantec
gptkb:Microsoft_Defender
Antivirus software
|
gptkbp:developedBy
|
2012
|
gptkbp:discoveredBy
|
2012
|
gptkbp:distributedBy
|
Drive-by downloads
Social engineering
USB infection
|
https://www.w3.org/2000/01/rdf-schema#label
|
njRAT
|
gptkbp:license
|
Illegally distributed
|
gptkbp:maliciousActivity
|
Data exfiltration
Spreading to other systems
System surveillance
|
gptkbp:notableEvent
|
gptkb:Operation_Molerats
Attacks in the Middle East
|
gptkbp:operatingSystem
|
gptkb:Windows
|
gptkbp:origin
|
gptkb:Middle_East
|
gptkbp:programmingLanguage
|
gptkb:Visual_Basic_.NET
|
gptkbp:repository
|
Leaked online
|
gptkbp:riskFactor
|
High
|
gptkbp:signature
|
gptkb:Bladabindi
|
gptkbp:spreadTo
|
Exploit kits
Malicious downloads
Phishing emails
|
gptkbp:target
|
Government agencies
Organizations
Individuals
|
gptkbp:type
|
malware
|
gptkbp:usedBy
|
APT groups
Cybercriminals
|
gptkbp:bfsParent
|
gptkb:TA-90
|
gptkbp:bfsLayer
|
5
|