General

  • Target

    fa612d5c77c1f6514c71f4cf7eea4eda_JaffaCakes118

  • Size

    96KB

  • Sample

    240927-pbkvqs1hrm

  • MD5

    fa612d5c77c1f6514c71f4cf7eea4eda

  • SHA1

    e84ecc4f78efaf6bb1bccb703b2634d1a0034587

  • SHA256

    404e9b800cd35e5ee193160f826dc9a604f6a1cf822fbdd080433b7d31ae7f1b

  • SHA512

    c4c0fafdf94ba3d76c92d256090cb1ad783a117d6ac96a51b5ac731d3464eacc9911ea6736b819800421f7aaf740df29f40b1a92582bce0c29bd03b3b472c0dd

  • SSDEEP

    1536:iYFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prcyMGp:iKS4jHS8q/3nTzePCwNUh4E9cyMGp

Malware Config

Targets

    • Target

      fa612d5c77c1f6514c71f4cf7eea4eda_JaffaCakes118

    • Size

      96KB

    • MD5

      fa612d5c77c1f6514c71f4cf7eea4eda

    • SHA1

      e84ecc4f78efaf6bb1bccb703b2634d1a0034587

    • SHA256

      404e9b800cd35e5ee193160f826dc9a604f6a1cf822fbdd080433b7d31ae7f1b

    • SHA512

      c4c0fafdf94ba3d76c92d256090cb1ad783a117d6ac96a51b5ac731d3464eacc9911ea6736b819800421f7aaf740df29f40b1a92582bce0c29bd03b3b472c0dd

    • SSDEEP

      1536:iYFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prcyMGp:iKS4jHS8q/3nTzePCwNUh4E9cyMGp

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks