General

  • Target

    8a332b01bd7526146cfdc497eb0355dc_JaffaCakes118

  • Size

    95KB

  • Sample

    240811-nm62nssajd

  • MD5

    8a332b01bd7526146cfdc497eb0355dc

  • SHA1

    ba88063f1ad0ebfafa228fb9482a60cd90427c91

  • SHA256

    0590d4c27dcf1904e251aeddca14bdf94fd57608c05e18ac2750fd01ea3cdc94

  • SHA512

    18723e317b350b204c1a43ee50d2247d486179e0e53b05bdb34323e87d63d349d2cd9321dc03d82a7088747bc9faf286b643e5e0c845bb05d91e6f87004beb0e

  • SSDEEP

    1536:AKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prQZLd+R2V4qt:AQS4jHS8q/3nTzePCwNUh4E9dqt

Malware Config

Targets

    • Target

      8a332b01bd7526146cfdc497eb0355dc_JaffaCakes118

    • Size

      95KB

    • MD5

      8a332b01bd7526146cfdc497eb0355dc

    • SHA1

      ba88063f1ad0ebfafa228fb9482a60cd90427c91

    • SHA256

      0590d4c27dcf1904e251aeddca14bdf94fd57608c05e18ac2750fd01ea3cdc94

    • SHA512

      18723e317b350b204c1a43ee50d2247d486179e0e53b05bdb34323e87d63d349d2cd9321dc03d82a7088747bc9faf286b643e5e0c845bb05d91e6f87004beb0e

    • SSDEEP

      1536:AKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prQZLd+R2V4qt:AQS4jHS8q/3nTzePCwNUh4E9dqt

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks