General
-
Target
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118
-
Size
235KB
-
Sample
240824-md2j6avgpc
-
MD5
be6422ed2b47bc6e81d6146f0d977ba6
-
SHA1
edbcb29d34cad42bb0e255ab7e753ad33a46b694
-
SHA256
1033ddb3daf9b0de8d844d8fd9909142156100cecf8ead6d26a19d49e3c48823
-
SHA512
9cd0e1062ef876d45cf1a5f97973e11d8b8a14122e49e288983e604f00606b59a6823d242a7e19e61a43b8557331fdbc489983c38b7ed2025d58024ed5c53716
-
SSDEEP
6144:LiOdmVPmM46lcDoFlAUVtiawv/iQAQaytn86ZkRBowjXDK/:LiOd4cDoFltVfw3iRUrknowjTM
Static task
static1
Behavioral task
behavioral1
Sample
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118
-
Size
235KB
-
MD5
be6422ed2b47bc6e81d6146f0d977ba6
-
SHA1
edbcb29d34cad42bb0e255ab7e753ad33a46b694
-
SHA256
1033ddb3daf9b0de8d844d8fd9909142156100cecf8ead6d26a19d49e3c48823
-
SHA512
9cd0e1062ef876d45cf1a5f97973e11d8b8a14122e49e288983e604f00606b59a6823d242a7e19e61a43b8557331fdbc489983c38b7ed2025d58024ed5c53716
-
SSDEEP
6144:LiOdmVPmM46lcDoFlAUVtiawv/iQAQaytn86ZkRBowjXDK/:LiOd4cDoFltVfw3iRUrknowjTM
-
Gh0st RAT payload
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Defense Evasion
Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1