General

  • Target

    9153ae1af9a05bacdcd984114512c5e2_JaffaCakes118

  • Size

    96KB

  • Sample

    241123-3m4nwaypbq

  • MD5

    9153ae1af9a05bacdcd984114512c5e2

  • SHA1

    0d458529a8813299508145137846f47cfbce37d2

  • SHA256

    aab89477fe00e8709660ee7feba0a4cd36b9d3a0c35d906134ea472942ad01cb

  • SHA512

    926ebe499f2d2bf77c8a115b8642c379bfb0918c20138dea0b778e2abd0013bccf1c6b2e695dcf377f2a1a745c1ba70dea5b924781ab335dad61efccb3bf7148

  • SSDEEP

    1536:zuFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prPvbi2Y:zUS4jHS8q/3nTzePCwNUh4E9Pe2Y

Malware Config

Targets

    • Target

      9153ae1af9a05bacdcd984114512c5e2_JaffaCakes118

    • Size

      96KB

    • MD5

      9153ae1af9a05bacdcd984114512c5e2

    • SHA1

      0d458529a8813299508145137846f47cfbce37d2

    • SHA256

      aab89477fe00e8709660ee7feba0a4cd36b9d3a0c35d906134ea472942ad01cb

    • SHA512

      926ebe499f2d2bf77c8a115b8642c379bfb0918c20138dea0b778e2abd0013bccf1c6b2e695dcf377f2a1a745c1ba70dea5b924781ab335dad61efccb3bf7148

    • SSDEEP

      1536:zuFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prPvbi2Y:zUS4jHS8q/3nTzePCwNUh4E9Pe2Y

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks