General

  • Target

    42e56a1d205c59ee02b67b2cefd74990_JaffaCakes118

  • Size

    96KB

  • Sample

    240713-xd1b7svdrc

  • MD5

    42e56a1d205c59ee02b67b2cefd74990

  • SHA1

    8990a81d2b521cc955282cf2354b24101a6d3902

  • SHA256

    b417af8138bab3bb024f13e7ad54f4433f8c8c71252b2e5b87cd4e68d69bd8a9

  • SHA512

    5f1144509a20d648e4d9cb3021cc52033b01982d5ab45dee9f0f9dc6b070fb267c5e68b7e8144032a556fc1874c7176cd223bf9157544ff5e7b41b7baa385423

  • SSDEEP

    1536:+IFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prC3+kWY3+wj:+aS4jHS8q/3nTzePCwNUh4E9C3+rYOwj

Malware Config

Targets

    • Target

      42e56a1d205c59ee02b67b2cefd74990_JaffaCakes118

    • Size

      96KB

    • MD5

      42e56a1d205c59ee02b67b2cefd74990

    • SHA1

      8990a81d2b521cc955282cf2354b24101a6d3902

    • SHA256

      b417af8138bab3bb024f13e7ad54f4433f8c8c71252b2e5b87cd4e68d69bd8a9

    • SHA512

      5f1144509a20d648e4d9cb3021cc52033b01982d5ab45dee9f0f9dc6b070fb267c5e68b7e8144032a556fc1874c7176cd223bf9157544ff5e7b41b7baa385423

    • SSDEEP

      1536:+IFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prC3+kWY3+wj:+aS4jHS8q/3nTzePCwNUh4E9C3+rYOwj

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks