General

  • Target

    4b6be3c45f65783ad2eab1d5776abbef_JaffaCakes118

  • Size

    95KB

  • Sample

    241016-e8e1msxbrm

  • MD5

    4b6be3c45f65783ad2eab1d5776abbef

  • SHA1

    854638eec670700fcb49f5fb1702b317ba80ff45

  • SHA256

    74b0aa165f99869dc9e618a642d9b77ff89f9c4692f51a8d3ac7681bdc4f09a5

  • SHA512

    af118d88ab6b9df601e87016328b25920b583efe357af89ed097c04e5fd52bd2720963a66a95992cc04d23e8a70a32a67e6d9c1be6b1f07413e88a0cca1ce165

  • SSDEEP

    1536:yPFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pr78OUz4D0G:yZS4jHS8q/3nTzePCwNUh4E973w4D0G

Malware Config

Targets

    • Target

      4b6be3c45f65783ad2eab1d5776abbef_JaffaCakes118

    • Size

      95KB

    • MD5

      4b6be3c45f65783ad2eab1d5776abbef

    • SHA1

      854638eec670700fcb49f5fb1702b317ba80ff45

    • SHA256

      74b0aa165f99869dc9e618a642d9b77ff89f9c4692f51a8d3ac7681bdc4f09a5

    • SHA512

      af118d88ab6b9df601e87016328b25920b583efe357af89ed097c04e5fd52bd2720963a66a95992cc04d23e8a70a32a67e6d9c1be6b1f07413e88a0cca1ce165

    • SSDEEP

      1536:yPFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pr78OUz4D0G:yZS4jHS8q/3nTzePCwNUh4E973w4D0G

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks