General

  • Target

    JaffaCakes118_3baa02971bb069ea3f0bc558ef894602

  • Size

    96KB

  • Sample

    250127-d8av9azmdr

  • MD5

    3baa02971bb069ea3f0bc558ef894602

  • SHA1

    28353f617a95e7b911df6206c183f9446196fac9

  • SHA256

    2f62aefa2a42dbc2649608ef226f32b3e974b4a03017d5edb14fc9301d3dce39

  • SHA512

    133a984b190c4f996782a1d69cf5e2112a2ab6fb732077fc2b907ac7249add4112a68f40b7190aa08fa2316d90b5f3e880c052d36535cb18d27d558b71527c5b

  • SSDEEP

    1536:0iFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnKlekv4gdYA:0IS4jHS8q/3nTzePCwNUh4E9n1K4gdB

Malware Config

Targets

    • Target

      JaffaCakes118_3baa02971bb069ea3f0bc558ef894602

    • Size

      96KB

    • MD5

      3baa02971bb069ea3f0bc558ef894602

    • SHA1

      28353f617a95e7b911df6206c183f9446196fac9

    • SHA256

      2f62aefa2a42dbc2649608ef226f32b3e974b4a03017d5edb14fc9301d3dce39

    • SHA512

      133a984b190c4f996782a1d69cf5e2112a2ab6fb732077fc2b907ac7249add4112a68f40b7190aa08fa2316d90b5f3e880c052d36535cb18d27d558b71527c5b

    • SSDEEP

      1536:0iFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnKlekv4gdYA:0IS4jHS8q/3nTzePCwNUh4E9n1K4gdB

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks