General

  • Target

    aec1b62c27ace9f430f547ab40daab28_JaffaCakes118

  • Size

    208KB

  • Sample

    240820-ltgn9ayhqm

  • MD5

    aec1b62c27ace9f430f547ab40daab28

  • SHA1

    53843199a74ba109c606b20824339a0ccdf4a0c3

  • SHA256

    0c7b60f4c0676b0612e9da88721f185f9fa96c66c6a82e0e3b402ca2cd1ada9f

  • SHA512

    b5d61a59af7f8b2724871361c643fcab907a6edb8643b690b975fab81f58f7c99012adfbeb4c7782836ffe5faad6f014a56488d51f85bbb1c474425acc2b8537

  • SSDEEP

    3072:mgmn0avOvtYz4nqSioDXx4uE9w2qbMUeZPgrQ/O/46h4M15m6D:Fw0avOvtYSiod4uYzqAvZd/2463vm6

Malware Config

Targets

    • Target

      aec1b62c27ace9f430f547ab40daab28_JaffaCakes118

    • Size

      208KB

    • MD5

      aec1b62c27ace9f430f547ab40daab28

    • SHA1

      53843199a74ba109c606b20824339a0ccdf4a0c3

    • SHA256

      0c7b60f4c0676b0612e9da88721f185f9fa96c66c6a82e0e3b402ca2cd1ada9f

    • SHA512

      b5d61a59af7f8b2724871361c643fcab907a6edb8643b690b975fab81f58f7c99012adfbeb4c7782836ffe5faad6f014a56488d51f85bbb1c474425acc2b8537

    • SSDEEP

      3072:mgmn0avOvtYz4nqSioDXx4uE9w2qbMUeZPgrQ/O/46h4M15m6D:Fw0avOvtYSiod4uYzqAvZd/2463vm6

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks