General

  • Target

    0e65d41d8af3502c4e0ff743e282f2fb_JaffaCakes118

  • Size

    96KB

  • Sample

    240625-rpdppaxhjr

  • MD5

    0e65d41d8af3502c4e0ff743e282f2fb

  • SHA1

    af0c603c5fe9cf5cb5ce23f81a657ebd01ee8e43

  • SHA256

    dea1eb2076ae50fcbf957bc4d16b821feafecfff19412866688898c55096d6a4

  • SHA512

    e8559db28b40e3d44e2ca700f84e33a7c6d3b7780d85316f9eb24eeda0e267fe4dda6e7591ab9848b54d01fc1ce4d1c5649d665f82ff71ef555a1e2671610586

  • SSDEEP

    1536:ahFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prDH5VXeteq5ag:a3S4jHS8q/3nTzePCwNUh4E975FTqQg

Malware Config

Targets

    • Target

      0e65d41d8af3502c4e0ff743e282f2fb_JaffaCakes118

    • Size

      96KB

    • MD5

      0e65d41d8af3502c4e0ff743e282f2fb

    • SHA1

      af0c603c5fe9cf5cb5ce23f81a657ebd01ee8e43

    • SHA256

      dea1eb2076ae50fcbf957bc4d16b821feafecfff19412866688898c55096d6a4

    • SHA512

      e8559db28b40e3d44e2ca700f84e33a7c6d3b7780d85316f9eb24eeda0e267fe4dda6e7591ab9848b54d01fc1ce4d1c5649d665f82ff71ef555a1e2671610586

    • SSDEEP

      1536:ahFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prDH5VXeteq5ag:a3S4jHS8q/3nTzePCwNUh4E975FTqQg

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks