General

  • Target

    5061d9fbeb46e880a3bbae2be2e19a16_JaffaCakes118

  • Size

    95KB

  • Sample

    241017-c4678a1grq

  • MD5

    5061d9fbeb46e880a3bbae2be2e19a16

  • SHA1

    da7f781d84332f162cbb1b112c0dab9778d812d7

  • SHA256

    622fb208146b213025a245536fe89a76680947802469efab6f40d76b27a129a4

  • SHA512

    ee9f11752aba7e83f3d93979e122b501d2da6182e52c45fda063a417bd5a5b2acbdff90a5319f0c3067ec816658cc78a2d20bf7b99057001773e144b1145a233

  • SSDEEP

    1536:QuJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prEWnFY2UHHCssa/:QufS4jHS8q/3nTzePCwNUh4E9E0W2mCg

Malware Config

Targets

    • Target

      5061d9fbeb46e880a3bbae2be2e19a16_JaffaCakes118

    • Size

      95KB

    • MD5

      5061d9fbeb46e880a3bbae2be2e19a16

    • SHA1

      da7f781d84332f162cbb1b112c0dab9778d812d7

    • SHA256

      622fb208146b213025a245536fe89a76680947802469efab6f40d76b27a129a4

    • SHA512

      ee9f11752aba7e83f3d93979e122b501d2da6182e52c45fda063a417bd5a5b2acbdff90a5319f0c3067ec816658cc78a2d20bf7b99057001773e144b1145a233

    • SSDEEP

      1536:QuJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prEWnFY2UHHCssa/:QufS4jHS8q/3nTzePCwNUh4E9E0W2mCg

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks