P8RAT

Description

(Kaspersky) One of Ecipekac’s payloads is a new fileless malware which we call P8RAT (a.k.a GreetCake). P8RAT has the following unique data structure used to store the C2 communication configuration. We collected several samples of P8RAT during our research and found no C2 address of P8RAT that was used more than once. In total we found 10 backdoor commands in all the collected P8RAT samples. The most recent P8RAT sample, with the compilation timestamp of December 14, 2020, shows a new backdoor command with the code number of “309” implemented. The command “304”, which was present in earlier samples and carries similar functionality, was removed.

Names

Name
P8RAT
GreetCake

Category

Malware

Type

  • Backdoor
  • Loader

Information

Mitre Attack

Other Information

Uuid

b5cb59ac-bfd5-400f-91ba-57472c375fd3

Last Card Change

2022-12-30