General

  • Target

    5f2988ab779dd3ef70914f4d208bf6b9_JaffaCakes118

  • Size

    140KB

  • Sample

    240720-fyg8pa1fle

  • MD5

    5f2988ab779dd3ef70914f4d208bf6b9

  • SHA1

    66d2309f54c6262ca377e048f04abfa7ba783f80

  • SHA256

    4fb51ca96177d18be97e26591287358e13e868d69c7b2794c8af06568658ab3b

  • SHA512

    195e29f45ec8c003f3f89c81979a3284e2d9914241ec9a07700537d8474a0b6b7bbfbbb8a0402ea7f3742d2d03a069a34dfdcff5dbc7ef16d99f413fee3e1939

  • SSDEEP

    3072:UBqhYZFlRL6eQvAn9RraPEDknMfDISyU4n:3MFlRL6eOMLIS5o

Malware Config

Targets

    • Target

      5f2988ab779dd3ef70914f4d208bf6b9_JaffaCakes118

    • Size

      140KB

    • MD5

      5f2988ab779dd3ef70914f4d208bf6b9

    • SHA1

      66d2309f54c6262ca377e048f04abfa7ba783f80

    • SHA256

      4fb51ca96177d18be97e26591287358e13e868d69c7b2794c8af06568658ab3b

    • SHA512

      195e29f45ec8c003f3f89c81979a3284e2d9914241ec9a07700537d8474a0b6b7bbfbbb8a0402ea7f3742d2d03a069a34dfdcff5dbc7ef16d99f413fee3e1939

    • SSDEEP

      3072:UBqhYZFlRL6eQvAn9RraPEDknMfDISyU4n:3MFlRL6eOMLIS5o

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks