General

  • Target

    adb7b15c325b1fdcaeeac650d49eb9e6_JaffaCakes118

  • Size

    96KB

  • Sample

    240820-d3mmvs1glc

  • MD5

    adb7b15c325b1fdcaeeac650d49eb9e6

  • SHA1

    7301d6de9064ba1a54ceb1ec7f3f843913ae3b6f

  • SHA256

    5011eaca226d7a09d4ae01071bcf0d6195c4accab502e99549297e705466b7c1

  • SHA512

    758351ddf314a123a849d2c589d0b311bcec26a05c2edcf59b0b1ef0789c1066145e0c2d87f2a2974956e0059f61644c06f474dacf253b8c362ee36a174158c1

  • SSDEEP

    1536:8XFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prUvwm2QvOQw:8hS4jHS8q/3nTzePCwNUh4E9EXOQw

Malware Config

Targets

    • Target

      adb7b15c325b1fdcaeeac650d49eb9e6_JaffaCakes118

    • Size

      96KB

    • MD5

      adb7b15c325b1fdcaeeac650d49eb9e6

    • SHA1

      7301d6de9064ba1a54ceb1ec7f3f843913ae3b6f

    • SHA256

      5011eaca226d7a09d4ae01071bcf0d6195c4accab502e99549297e705466b7c1

    • SHA512

      758351ddf314a123a849d2c589d0b311bcec26a05c2edcf59b0b1ef0789c1066145e0c2d87f2a2974956e0059f61644c06f474dacf253b8c362ee36a174158c1

    • SSDEEP

      1536:8XFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prUvwm2QvOQw:8hS4jHS8q/3nTzePCwNUh4E9EXOQw

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks