General

  • Target

    7487bbfadde66edddf131b879382a9ef_JaffaCakes118

  • Size

    184KB

  • Sample

    240726-scshravcqk

  • MD5

    7487bbfadde66edddf131b879382a9ef

  • SHA1

    621299843ef9d362ded456a4114869c1b6763f10

  • SHA256

    76e3126ddc11909250b1bcf4f7dcd53d2fa4c37f490e202d31326a94131a4932

  • SHA512

    b2dffe7858853ef6c3f82312649bcca9ccfde34173853e4a94f4ec79a2bd2111a088766a5812755a95abb2401ab398fb393976772e6d934e7f1c0ede56a7d19a

  • SSDEEP

    3072:R4OgRg6b0uaPWmgcnQqm7C9rMxRAxWm+H3VkENlz+B2OP5nTw1aIWeNn8Sl:R4Oc0ue9xnQqmGqA5+XVkENl6/PNCpWS

Malware Config

Targets

    • Target

      7487bbfadde66edddf131b879382a9ef_JaffaCakes118

    • Size

      184KB

    • MD5

      7487bbfadde66edddf131b879382a9ef

    • SHA1

      621299843ef9d362ded456a4114869c1b6763f10

    • SHA256

      76e3126ddc11909250b1bcf4f7dcd53d2fa4c37f490e202d31326a94131a4932

    • SHA512

      b2dffe7858853ef6c3f82312649bcca9ccfde34173853e4a94f4ec79a2bd2111a088766a5812755a95abb2401ab398fb393976772e6d934e7f1c0ede56a7d19a

    • SSDEEP

      3072:R4OgRg6b0uaPWmgcnQqm7C9rMxRAxWm+H3VkENlz+B2OP5nTw1aIWeNn8Sl:R4Oc0ue9xnQqmGqA5+XVkENl6/PNCpWS

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks