Resubmissions

27-06-2024 12:49

240627-p2twbsscpa 10

27-06-2024 12:45

240627-py2f1avanr 10

General

  • Target

    160f0df132f7ef72bb0925d66fc9fc7f_JaffaCakes118

  • Size

    96KB

  • Sample

    240627-py2f1avanr

  • MD5

    160f0df132f7ef72bb0925d66fc9fc7f

  • SHA1

    508c55d6ff391df0b4e4efdd7786bdaffd10a23d

  • SHA256

    5d176047bf863b5efbc3da771af58acba1a59f933807aec5bc0929e71822e7a8

  • SHA512

    15c764d6aca16fcb01d8fbe8a9a3944643ada7a739a9fab1102729451e49efbb3750b8fd258fd96fad5b786ff93aa6c89b0bde0d0f8e4e12ee29af9973d6cf6e

  • SSDEEP

    1536:8uFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8przeoobQdbNcO0sJ:8US4jHS8q/3nTzePCwNUh4E9zeoVPWsJ

Malware Config

Targets

    • Target

      160f0df132f7ef72bb0925d66fc9fc7f_JaffaCakes118

    • Size

      96KB

    • MD5

      160f0df132f7ef72bb0925d66fc9fc7f

    • SHA1

      508c55d6ff391df0b4e4efdd7786bdaffd10a23d

    • SHA256

      5d176047bf863b5efbc3da771af58acba1a59f933807aec5bc0929e71822e7a8

    • SHA512

      15c764d6aca16fcb01d8fbe8a9a3944643ada7a739a9fab1102729451e49efbb3750b8fd258fd96fad5b786ff93aa6c89b0bde0d0f8e4e12ee29af9973d6cf6e

    • SSDEEP

      1536:8uFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8przeoobQdbNcO0sJ:8US4jHS8q/3nTzePCwNUh4E9zeoVPWsJ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks