General

  • Target

    1a9205042023d979e958dd563d4be702_JaffaCakes118

  • Size

    96KB

  • Sample

    240701-j7eeyavalj

  • MD5

    1a9205042023d979e958dd563d4be702

  • SHA1

    aacae9f7063de4cfb2f6582a6a0b2563f25f3db0

  • SHA256

    05ab88b2dc467dbe4b9a81f0a5bdd93e0880bf81ad29c12b96fa8860ad8dbed4

  • SHA512

    396e10d17ae050904633847808aa627732583b8cb05c27b42d9ebe7ed749b713b1ce7ca5cc2fa3975958d2ce62c66d6cf6ae257613d390d37d4c35712b9bb1dc

  • SSDEEP

    3072:8fS4jHS8q/3nTzePCwNUh4E9Wvz+fhMQB:8q428q/nTzePCwG7Gm3

Malware Config

Targets

    • Target

      1a9205042023d979e958dd563d4be702_JaffaCakes118

    • Size

      96KB

    • MD5

      1a9205042023d979e958dd563d4be702

    • SHA1

      aacae9f7063de4cfb2f6582a6a0b2563f25f3db0

    • SHA256

      05ab88b2dc467dbe4b9a81f0a5bdd93e0880bf81ad29c12b96fa8860ad8dbed4

    • SHA512

      396e10d17ae050904633847808aa627732583b8cb05c27b42d9ebe7ed749b713b1ce7ca5cc2fa3975958d2ce62c66d6cf6ae257613d390d37d4c35712b9bb1dc

    • SSDEEP

      3072:8fS4jHS8q/3nTzePCwNUh4E9Wvz+fhMQB:8q428q/nTzePCwG7Gm3

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks