General

  • Target

    JaffaCakes118_43305d696831d81542841405d6f59b9c

  • Size

    192KB

  • Sample

    250127-yqbeaatqcm

  • MD5

    43305d696831d81542841405d6f59b9c

  • SHA1

    bb739181f44eb8dcd22bce7ff35758fd0cbdc745

  • SHA256

    b2282223cd9dca853771a8a6d16b38fe5674555ae844705748d18e42d123b60a

  • SHA512

    36ccfdc94b9738bf703a22489a4b9ee8effddd1b0cae088af0d329b19592090f88dd61e855770fe55bf536658de919de5eb8e55e99d5e7daed31d323785116c2

  • SSDEEP

    3072:N5R4Wn5maVTVPA/LJY3MYUbLxETgPsiq38H8wQ4/2udVzBDDPFrBGJtSo:j5maVTVPGLJY3JumTgPsz38ci/2uvzxj

Malware Config

Targets

    • Target

      JaffaCakes118_43305d696831d81542841405d6f59b9c

    • Size

      192KB

    • MD5

      43305d696831d81542841405d6f59b9c

    • SHA1

      bb739181f44eb8dcd22bce7ff35758fd0cbdc745

    • SHA256

      b2282223cd9dca853771a8a6d16b38fe5674555ae844705748d18e42d123b60a

    • SHA512

      36ccfdc94b9738bf703a22489a4b9ee8effddd1b0cae088af0d329b19592090f88dd61e855770fe55bf536658de919de5eb8e55e99d5e7daed31d323785116c2

    • SSDEEP

      3072:N5R4Wn5maVTVPA/LJY3MYUbLxETgPsiq38H8wQ4/2udVzBDDPFrBGJtSo:j5maVTVPGLJY3JumTgPsz38ci/2uvzxj

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks