General

  • Target

    fc62e83e4105ebb4b73f995568f46e63_JaffaCakes118

  • Size

    96KB

  • Sample

    240420-kvwzwsde9y

  • MD5

    fc62e83e4105ebb4b73f995568f46e63

  • SHA1

    7c4d494642487e8c1ffee930ef2e221238e4539a

  • SHA256

    78d9a3f43771a66b2ca4a3b06cb534ef477855c34d8673dc2051d8a203ffe66c

  • SHA512

    a4c5eb9866051629e6bd53badbccfdc060ea2355b7286fe35ce9f3365e1ee0e5a16e518e533b85141f94525f9fe0d9052c0cffdb342f5464f68d4ce63b722284

  • SSDEEP

    1536:oKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pryTNH9VtWrZt:oQS4jHS8q/3nTzePCwNUh4E9yxdoZt

Malware Config

Targets

    • Target

      fc62e83e4105ebb4b73f995568f46e63_JaffaCakes118

    • Size

      96KB

    • MD5

      fc62e83e4105ebb4b73f995568f46e63

    • SHA1

      7c4d494642487e8c1ffee930ef2e221238e4539a

    • SHA256

      78d9a3f43771a66b2ca4a3b06cb534ef477855c34d8673dc2051d8a203ffe66c

    • SHA512

      a4c5eb9866051629e6bd53badbccfdc060ea2355b7286fe35ce9f3365e1ee0e5a16e518e533b85141f94525f9fe0d9052c0cffdb342f5464f68d4ce63b722284

    • SSDEEP

      1536:oKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pryTNH9VtWrZt:oQS4jHS8q/3nTzePCwNUh4E9yxdoZt

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks