General

  • Target

    JaffaCakes118_48c47a99507917479f4f2d7c31e60e4f

  • Size

    245KB

  • Sample

    250128-j72kgasqax

  • MD5

    48c47a99507917479f4f2d7c31e60e4f

  • SHA1

    a2f96c638d47c939459277b2c74fa22b56b0cb9c

  • SHA256

    d97507acafc889962a169e094662ef489057e5aa517e69125f1f89c1f120d797

  • SHA512

    26ea894a1bb16b6ddb00d9e8c2b5765b7e71b7292aacb75d02382b6f38b82306c118916253a37170d3dd6447706c19889c084d23ff4491001d792893a8fff936

  • SSDEEP

    3072:1tABk6WSnYteZP4kIEiXfesgUbzXUCgcXL3uj5e8GCYrhXKqDg7kNIY9V0Kdsvgm:HABk6WSnYteZsGXGVXru64sIhCN2Fb

Malware Config

Targets

    • Target

      JaffaCakes118_48c47a99507917479f4f2d7c31e60e4f

    • Size

      245KB

    • MD5

      48c47a99507917479f4f2d7c31e60e4f

    • SHA1

      a2f96c638d47c939459277b2c74fa22b56b0cb9c

    • SHA256

      d97507acafc889962a169e094662ef489057e5aa517e69125f1f89c1f120d797

    • SHA512

      26ea894a1bb16b6ddb00d9e8c2b5765b7e71b7292aacb75d02382b6f38b82306c118916253a37170d3dd6447706c19889c084d23ff4491001d792893a8fff936

    • SSDEEP

      3072:1tABk6WSnYteZP4kIEiXfesgUbzXUCgcXL3uj5e8GCYrhXKqDg7kNIY9V0Kdsvgm:HABk6WSnYteZsGXGVXru64sIhCN2Fb

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks