General

  • Target

    JaffaCakes118_47f44d67f74040c429f4999e1901ff78

  • Size

    317KB

  • Sample

    250128-hgrf5szqhv

  • MD5

    47f44d67f74040c429f4999e1901ff78

  • SHA1

    67936b04b805799bded441017e736d18fda08602

  • SHA256

    1226e0a39d3f07469a01ee277725321fe1d7b11c0e6502d6db85a9bdf82c336e

  • SHA512

    5fa1f0e52ce7c87ca0c6d30a95e64f2a1b6593eecc883a88dd82708d22d7e69f6cae897edd14d6fcb882b23e28138b0bf9a7da7c73cd4df7c314bc121f65d71a

  • SSDEEP

    6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdV:kbB5jfgexjrOA9NRPmxwX/itFV

Malware Config

Targets

    • Target

      JaffaCakes118_47f44d67f74040c429f4999e1901ff78

    • Size

      317KB

    • MD5

      47f44d67f74040c429f4999e1901ff78

    • SHA1

      67936b04b805799bded441017e736d18fda08602

    • SHA256

      1226e0a39d3f07469a01ee277725321fe1d7b11c0e6502d6db85a9bdf82c336e

    • SHA512

      5fa1f0e52ce7c87ca0c6d30a95e64f2a1b6593eecc883a88dd82708d22d7e69f6cae897edd14d6fcb882b23e28138b0bf9a7da7c73cd4df7c314bc121f65d71a

    • SSDEEP

      6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdV:kbB5jfgexjrOA9NRPmxwX/itFV

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks