General
-
Target
bbfbed6628ef8c7aee1dc3575e807000_JaffaCakes118
-
Size
1.8MB
-
Sample
240823-q395daxela
-
MD5
bbfbed6628ef8c7aee1dc3575e807000
-
SHA1
e77c0e1a22c82781795e2fd2209774d3137f1617
-
SHA256
03a109a2f0aa33b78c4b37cb9c7696d76739de81d88e7192f3b88c07a01c74db
-
SHA512
17a7ae660f584c5db0646de802dfd68f71eac4c08402531e81e104ce21466d75d5bbd1a52120842490bb6bffc529ecd3c58c7ce09056099a8837e62badcf1310
-
SSDEEP
49152:rWIGAqQ6x8sqK6cKv+Am/jYOU4H7x+jWttcES:rBHWx8TajYOFwj/
Behavioral task
behavioral1
Sample
bbfbed6628ef8c7aee1dc3575e807000_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
bbfbed6628ef8c7aee1dc3575e807000_JaffaCakes118
-
Size
1.8MB
-
MD5
bbfbed6628ef8c7aee1dc3575e807000
-
SHA1
e77c0e1a22c82781795e2fd2209774d3137f1617
-
SHA256
03a109a2f0aa33b78c4b37cb9c7696d76739de81d88e7192f3b88c07a01c74db
-
SHA512
17a7ae660f584c5db0646de802dfd68f71eac4c08402531e81e104ce21466d75d5bbd1a52120842490bb6bffc529ecd3c58c7ce09056099a8837e62badcf1310
-
SSDEEP
49152:rWIGAqQ6x8sqK6cKv+Am/jYOU4H7x+jWttcES:rBHWx8TajYOFwj/
-
Gh0st RAT payload
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1