General

  • Target

    0f19d97e2959bf5a4b8d649b3e632400_JaffaCakes118

  • Size

    96KB

  • Sample

    241003-rk8n9sshkf

  • MD5

    0f19d97e2959bf5a4b8d649b3e632400

  • SHA1

    b279203b32e209aee15633fd8bc5e9b1db3ee182

  • SHA256

    165fa9f7e043f744549831cd58108c820af3a362acbae42f0818b3158a80aed9

  • SHA512

    7b17cc7f3c52c19b16769626b5694754593423832a52fb644ebeeded58ba4630c1e5a2f91181ca6a687d7267d5f5e836a3679be0a00a7a89baa01900459a6351

  • SSDEEP

    1536:iIFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prCsEotChLDW:iaS4jHS8q/3nTzePCwNUh4E9CsEoOLa

Malware Config

Targets

    • Target

      0f19d97e2959bf5a4b8d649b3e632400_JaffaCakes118

    • Size

      96KB

    • MD5

      0f19d97e2959bf5a4b8d649b3e632400

    • SHA1

      b279203b32e209aee15633fd8bc5e9b1db3ee182

    • SHA256

      165fa9f7e043f744549831cd58108c820af3a362acbae42f0818b3158a80aed9

    • SHA512

      7b17cc7f3c52c19b16769626b5694754593423832a52fb644ebeeded58ba4630c1e5a2f91181ca6a687d7267d5f5e836a3679be0a00a7a89baa01900459a6351

    • SSDEEP

      1536:iIFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prCsEotChLDW:iaS4jHS8q/3nTzePCwNUh4E9CsEoOLa

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks