General

  • Target

    93aff93ac29ba108fc510f256554d607_JaffaCakes118

  • Size

    192KB

  • Sample

    240813-sz4jjawfqm

  • MD5

    93aff93ac29ba108fc510f256554d607

  • SHA1

    5bff8bc2ca987f18cb4307436810e5a41d17de90

  • SHA256

    77a11fc24b2887d9dbb378b53036c104bbaddaedf058aada1e2ac49ac0c8ed8a

  • SHA512

    f5fa0cd64779cf306bc7bb05200a3660284d867910ebdd0ca6ea09e122e29079597f9f6b210fcdb7a6901b2bb81a64562021781dfce8bc27de58139a15dcb31f

  • SSDEEP

    3072:DHQfaVtVZJX+xwVn0sk4WULmrkmiovIPxH4Ka+5T454I/wov3w9pQdxkVu/v1R7d:AaVtVixekWLBxYkTYN/hiu30u/tFYIci

Malware Config

Targets

    • Target

      93aff93ac29ba108fc510f256554d607_JaffaCakes118

    • Size

      192KB

    • MD5

      93aff93ac29ba108fc510f256554d607

    • SHA1

      5bff8bc2ca987f18cb4307436810e5a41d17de90

    • SHA256

      77a11fc24b2887d9dbb378b53036c104bbaddaedf058aada1e2ac49ac0c8ed8a

    • SHA512

      f5fa0cd64779cf306bc7bb05200a3660284d867910ebdd0ca6ea09e122e29079597f9f6b210fcdb7a6901b2bb81a64562021781dfce8bc27de58139a15dcb31f

    • SSDEEP

      3072:DHQfaVtVZJX+xwVn0sk4WULmrkmiovIPxH4Ka+5T454I/wov3w9pQdxkVu/v1R7d:AaVtVixekWLBxYkTYN/hiu30u/tFYIci

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks