General

  • Target

    JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402

  • Size

    518KB

  • Sample

    250127-s7ekdavrdv

  • MD5

    4128e44f1d14b6ba04ac744ad434d402

  • SHA1

    33efef5e8c9c48c3be35612af6d0c7ac9797d736

  • SHA256

    00a694cdbe727236aacdcebbf78d079f7556be71f95dcab9efa2a49454cad8b7

  • SHA512

    7fa340e65a1151b026e0aca5334dbb8d501688ee42f77f47e21935d5877cb1f51277b5dccf88af277cd8517e50e46a8e2d23705e2288ee75976beed16b15044a

  • SSDEEP

    6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdu50CnP3xIxHIYP:kbB5jfgexjrOA9NRPmxwX/itF/

Malware Config

Targets

    • Target

      JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402

    • Size

      518KB

    • MD5

      4128e44f1d14b6ba04ac744ad434d402

    • SHA1

      33efef5e8c9c48c3be35612af6d0c7ac9797d736

    • SHA256

      00a694cdbe727236aacdcebbf78d079f7556be71f95dcab9efa2a49454cad8b7

    • SHA512

      7fa340e65a1151b026e0aca5334dbb8d501688ee42f77f47e21935d5877cb1f51277b5dccf88af277cd8517e50e46a8e2d23705e2288ee75976beed16b15044a

    • SSDEEP

      6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdu50CnP3xIxHIYP:kbB5jfgexjrOA9NRPmxwX/itF/

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks