General

  • Target

    JaffaCakes118_3c35ee6a85f5383f3887fbfa5fde7e67

  • Size

    95KB

  • Sample

    250127-fr6ygasnat

  • MD5

    3c35ee6a85f5383f3887fbfa5fde7e67

  • SHA1

    c1ea7b0cdf5839825eafedd024f3e6d92a32eacd

  • SHA256

    3f46efb836e93fdea60bb31ae4fc8b9b2368024a702ce86e449fd78b93a9d343

  • SHA512

    08f70f194601372b271534da231d2a7e25179124b47c9612bf0a37e6fd130ec32894158d5775ae552a2d508d6b8fb5ab018c14c968310af6187d14d365b84894

  • SSDEEP

    1536:L+FusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prdpP23/:LES4jHS8q/3nTzePCwNUh4E9Tm

Malware Config

Targets

    • Target

      JaffaCakes118_3c35ee6a85f5383f3887fbfa5fde7e67

    • Size

      95KB

    • MD5

      3c35ee6a85f5383f3887fbfa5fde7e67

    • SHA1

      c1ea7b0cdf5839825eafedd024f3e6d92a32eacd

    • SHA256

      3f46efb836e93fdea60bb31ae4fc8b9b2368024a702ce86e449fd78b93a9d343

    • SHA512

      08f70f194601372b271534da231d2a7e25179124b47c9612bf0a37e6fd130ec32894158d5775ae552a2d508d6b8fb5ab018c14c968310af6187d14d365b84894

    • SSDEEP

      1536:L+FusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prdpP23/:LES4jHS8q/3nTzePCwNUh4E9Tm

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks