General

  • Target

    be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118

  • Size

    235KB

  • Sample

    240824-md2j6avgpc

  • MD5

    be6422ed2b47bc6e81d6146f0d977ba6

  • SHA1

    edbcb29d34cad42bb0e255ab7e753ad33a46b694

  • SHA256

    1033ddb3daf9b0de8d844d8fd9909142156100cecf8ead6d26a19d49e3c48823

  • SHA512

    9cd0e1062ef876d45cf1a5f97973e11d8b8a14122e49e288983e604f00606b59a6823d242a7e19e61a43b8557331fdbc489983c38b7ed2025d58024ed5c53716

  • SSDEEP

    6144:LiOdmVPmM46lcDoFlAUVtiawv/iQAQaytn86ZkRBowjXDK/:LiOd4cDoFltVfw3iRUrknowjTM

Malware Config

Targets

    • Target

      be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118

    • Size

      235KB

    • MD5

      be6422ed2b47bc6e81d6146f0d977ba6

    • SHA1

      edbcb29d34cad42bb0e255ab7e753ad33a46b694

    • SHA256

      1033ddb3daf9b0de8d844d8fd9909142156100cecf8ead6d26a19d49e3c48823

    • SHA512

      9cd0e1062ef876d45cf1a5f97973e11d8b8a14122e49e288983e604f00606b59a6823d242a7e19e61a43b8557331fdbc489983c38b7ed2025d58024ed5c53716

    • SSDEEP

      6144:LiOdmVPmM46lcDoFlAUVtiawv/iQAQaytn86ZkRBowjXDK/:LiOd4cDoFltVfw3iRUrknowjTM

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks