General

  • Target

    48dd45032b620046f9b94ef443b07669_JaffaCakes118

  • Size

    95KB

  • Sample

    240715-jmxe1swamr

  • MD5

    48dd45032b620046f9b94ef443b07669

  • SHA1

    4f2542d6dc5918bbf81b5337377eb4de8c2580d8

  • SHA256

    5f25a15e5e3bf6f9da6b2db85a9b6b7adc2d5cf2087c48f31dd7db4d5099602b

  • SHA512

    0d6fb16fc49d157a84bae830e59e27a5502d5ac81bd22687b65e590c340632bf5ebb934b14fa020ee502339319df40db1c028dee86a03d36a712f14511a056d3

  • SSDEEP

    1536:CYFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prPUSry9KLw:CKS4jHS8q/3nTzePCwNUh4E9PUSu9KLw

Malware Config

Targets

    • Target

      48dd45032b620046f9b94ef443b07669_JaffaCakes118

    • Size

      95KB

    • MD5

      48dd45032b620046f9b94ef443b07669

    • SHA1

      4f2542d6dc5918bbf81b5337377eb4de8c2580d8

    • SHA256

      5f25a15e5e3bf6f9da6b2db85a9b6b7adc2d5cf2087c48f31dd7db4d5099602b

    • SHA512

      0d6fb16fc49d157a84bae830e59e27a5502d5ac81bd22687b65e590c340632bf5ebb934b14fa020ee502339319df40db1c028dee86a03d36a712f14511a056d3

    • SSDEEP

      1536:CYFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prPUSry9KLw:CKS4jHS8q/3nTzePCwNUh4E9PUSu9KLw

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks