General

  • Target

    JaffaCakes118_3c5ceb6c6c80835baf0802d6bbfa8ce6

  • Size

    96KB

  • Sample

    250127-f5jp4avjfr

  • MD5

    3c5ceb6c6c80835baf0802d6bbfa8ce6

  • SHA1

    d1c1006b714334854316ee9dec8cd23ea0af89a7

  • SHA256

    3de735a8224cce1ea620fee1064b8c5c5b0c468b084573c31c2f75514c109b45

  • SHA512

    1592c5f4884af431e020482aaae8480714737bffb7d805fc2f5d2b4b8e7bc0ae3ebb803b3fcb9e2cd0d16a10e1dd78c3d86dcf0cf534cd10e78ff148cc7044b5

  • SSDEEP

    3072:nDS4jHS8q/3nTzePCwNUh4E9s8HfycaYu:n2428q/nTzePCwG7t7S

Malware Config

Targets

    • Target

      JaffaCakes118_3c5ceb6c6c80835baf0802d6bbfa8ce6

    • Size

      96KB

    • MD5

      3c5ceb6c6c80835baf0802d6bbfa8ce6

    • SHA1

      d1c1006b714334854316ee9dec8cd23ea0af89a7

    • SHA256

      3de735a8224cce1ea620fee1064b8c5c5b0c468b084573c31c2f75514c109b45

    • SHA512

      1592c5f4884af431e020482aaae8480714737bffb7d805fc2f5d2b4b8e7bc0ae3ebb803b3fcb9e2cd0d16a10e1dd78c3d86dcf0cf534cd10e78ff148cc7044b5

    • SSDEEP

      3072:nDS4jHS8q/3nTzePCwNUh4E9s8HfycaYu:n2428q/nTzePCwG7t7S

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks