General

  • Target

    3d1b42cfb16558df5bacb002aa2461bb_JaffaCakes118

  • Size

    192KB

  • Sample

    240712-m5gn3azhpr

  • MD5

    3d1b42cfb16558df5bacb002aa2461bb

  • SHA1

    33ba02e00939f57f485e30c14584369c7b727beb

  • SHA256

    30a72f7a7f6f9055a5ee2d84fb0c92bf4f0da96350465db543b1fecf83cc1b91

  • SHA512

    c02ccba7c86261c2a1a950a3191b419f6d8990d2d8e5c83032246733734a7efeba40fb42406afd354a5f46b6f0f8d6c84360a8ecd4e281ab27b382161a124c56

  • SSDEEP

    3072:rZ19D6NEk3Vm6WseEGEx4oNuMJ1yXTML/SuAFbB33XnOSSjtClJDep+9KpG4Yz9:U3Vm6WX9E2o4MyCKLXOSSM7KkIpBYz

Malware Config

Targets

    • Target

      3d1b42cfb16558df5bacb002aa2461bb_JaffaCakes118

    • Size

      192KB

    • MD5

      3d1b42cfb16558df5bacb002aa2461bb

    • SHA1

      33ba02e00939f57f485e30c14584369c7b727beb

    • SHA256

      30a72f7a7f6f9055a5ee2d84fb0c92bf4f0da96350465db543b1fecf83cc1b91

    • SHA512

      c02ccba7c86261c2a1a950a3191b419f6d8990d2d8e5c83032246733734a7efeba40fb42406afd354a5f46b6f0f8d6c84360a8ecd4e281ab27b382161a124c56

    • SSDEEP

      3072:rZ19D6NEk3Vm6WseEGEx4oNuMJ1yXTML/SuAFbB33XnOSSjtClJDep+9KpG4Yz9:U3Vm6WX9E2o4MyCKLXOSSM7KkIpBYz

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks