General

  • Target

    84a79dffccd7010b0aa1f232621d9963_JaffaCakes118

  • Size

    192KB

  • Sample

    240810-d4qqxatfrl

  • MD5

    84a79dffccd7010b0aa1f232621d9963

  • SHA1

    8a35e62e044bee0dfc7dcbd5093a2ba5453256cd

  • SHA256

    d62c79b5cd02a59cd88dfbf4b2b6a694b53421de75f5ce075b45587731e77da5

  • SHA512

    ab93555979e36b25e4fd8b2e16f515f0888a77a642d59e02e400af45606b724a9dcc524a4accf3888e0c86c61640bcb0339e56aa2fa759702fbbc1b0b814a3a7

  • SSDEEP

    3072:8JsX8GaVAkWVgWl8wxNOTR7FR+23HoPikE7vQdqt7oLVRW7tdwi:HaViV35xNC3rHo6PvyLVM/w

Malware Config

Targets

    • Target

      84a79dffccd7010b0aa1f232621d9963_JaffaCakes118

    • Size

      192KB

    • MD5

      84a79dffccd7010b0aa1f232621d9963

    • SHA1

      8a35e62e044bee0dfc7dcbd5093a2ba5453256cd

    • SHA256

      d62c79b5cd02a59cd88dfbf4b2b6a694b53421de75f5ce075b45587731e77da5

    • SHA512

      ab93555979e36b25e4fd8b2e16f515f0888a77a642d59e02e400af45606b724a9dcc524a4accf3888e0c86c61640bcb0339e56aa2fa759702fbbc1b0b814a3a7

    • SSDEEP

      3072:8JsX8GaVAkWVgWl8wxNOTR7FR+23HoPikE7vQdqt7oLVRW7tdwi:HaViV35xNC3rHo6PvyLVM/w

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks