General

  • Target

    8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118

  • Size

    173KB

  • Sample

    240810-pgbh9atamd

  • MD5

    8605b02ce7da287ca5db5f6235925bc6

  • SHA1

    3c676c57c074e8a9aec4b0b159758fe6b1a08e02

  • SHA256

    10865c6d3d893ab83787a859a740166f555c085524c2a64069f30aa633eb2d9e

  • SHA512

    77576b4a5650434b70cfea51a00ded21dfbb3ce67616c974ebbbc9598971cc1d55571976e9794debd1fb87b1597ceae9253e2cc9c0f92bbcb4a37b2d919a8aff

  • SSDEEP

    3072:ZhT2137DYmJoAbaZBJcFJu9Km563zXZeJeSG+bhN4HMO5Ur2v5skE:ZhRKicdqMzXZeJeS5bhN4Hdxs7

Malware Config

Targets

    • Target

      8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118

    • Size

      173KB

    • MD5

      8605b02ce7da287ca5db5f6235925bc6

    • SHA1

      3c676c57c074e8a9aec4b0b159758fe6b1a08e02

    • SHA256

      10865c6d3d893ab83787a859a740166f555c085524c2a64069f30aa633eb2d9e

    • SHA512

      77576b4a5650434b70cfea51a00ded21dfbb3ce67616c974ebbbc9598971cc1d55571976e9794debd1fb87b1597ceae9253e2cc9c0f92bbcb4a37b2d919a8aff

    • SSDEEP

      3072:ZhT2137DYmJoAbaZBJcFJu9Km563zXZeJeSG+bhN4HMO5Ur2v5skE:ZhRKicdqMzXZeJeS5bhN4Hdxs7

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks