General

  • Target

    9fc9ac5b6dafb6e258a85af801f0ca18_JaffaCakes118

  • Size

    96KB

  • Sample

    240816-y38wbavcla

  • MD5

    9fc9ac5b6dafb6e258a85af801f0ca18

  • SHA1

    2d5595c355762a4ed21a8321f3ad74caeb43225f

  • SHA256

    606fe598acd7b8cf617e6ffaf99bc3e6e3d98a828fd89615930970ab1a218c2f

  • SHA512

    af0b06502f7ce7984d6f53a6a918f38447089d754cb007bb2dd0645ace4cc66d11d973540d1a175e844a9777b7d2d37c57a5c882407047dcd11055dfb7ee11a8

  • SSDEEP

    1536:2bFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prWLvnnwSeP7Z:2VS4jHS8q/3nTzePCwNUh4E9WDnw5P7Z

Malware Config

Targets

    • Target

      9fc9ac5b6dafb6e258a85af801f0ca18_JaffaCakes118

    • Size

      96KB

    • MD5

      9fc9ac5b6dafb6e258a85af801f0ca18

    • SHA1

      2d5595c355762a4ed21a8321f3ad74caeb43225f

    • SHA256

      606fe598acd7b8cf617e6ffaf99bc3e6e3d98a828fd89615930970ab1a218c2f

    • SHA512

      af0b06502f7ce7984d6f53a6a918f38447089d754cb007bb2dd0645ace4cc66d11d973540d1a175e844a9777b7d2d37c57a5c882407047dcd11055dfb7ee11a8

    • SSDEEP

      1536:2bFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prWLvnnwSeP7Z:2VS4jHS8q/3nTzePCwNUh4E9WDnw5P7Z

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks