General

  • Target

    89945e6656104384940ecc448dd51ed8_JaffaCakes118

  • Size

    470KB

  • Sample

    240811-jpkh8svflg

  • MD5

    89945e6656104384940ecc448dd51ed8

  • SHA1

    83470331a82cdfbdc734bb229cdb6548307ed268

  • SHA256

    d5ac269da45ba31c35e285e0b12f7ccea70b4e08aa500568d118751d0bb7b63a

  • SHA512

    bea5968ceb9a65b1e03c4b6d97a5bb38cc8dcbfdefffc0b8db3a77edf9618ceff346ec0f831e1a5dfc259922fde7ab52a2476f53502f1e29e8866bdc2e2e9350

  • SSDEEP

    6144:68egewpkT3Ye77M+e6WKvf8QLBBzAM+GuN8QpKP7ZNP:6fgewQYe7I+FlLbzL+jkD

Malware Config

Targets

    • Target

      89945e6656104384940ecc448dd51ed8_JaffaCakes118

    • Size

      470KB

    • MD5

      89945e6656104384940ecc448dd51ed8

    • SHA1

      83470331a82cdfbdc734bb229cdb6548307ed268

    • SHA256

      d5ac269da45ba31c35e285e0b12f7ccea70b4e08aa500568d118751d0bb7b63a

    • SHA512

      bea5968ceb9a65b1e03c4b6d97a5bb38cc8dcbfdefffc0b8db3a77edf9618ceff346ec0f831e1a5dfc259922fde7ab52a2476f53502f1e29e8866bdc2e2e9350

    • SSDEEP

      6144:68egewpkT3Ye77M+e6WKvf8QLBBzAM+GuN8QpKP7ZNP:6fgewQYe7I+FlLbzL+jkD

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks