General

  • Target

    JaffaCakes118_497730398d40b55e7e969e8784b68a95

  • Size

    220KB

  • Sample

    250128-lp7d4svlft

  • MD5

    497730398d40b55e7e969e8784b68a95

  • SHA1

    f0a84bc368acead6be937eae9192a7e24f878e46

  • SHA256

    71543c8e405705e9bbebc3f7f0d6bb954c0f4da8e00ead618ff263ed3ba144be

  • SHA512

    f1a72f2335daec7faa3e2a97abe0ce05a4f6946dd27fd2e635b4179ad240c05d3c5d77da0bd37f0c4d9e2834b74a9deea823aa8ab4fa99d52618df8babe04ecc

  • SSDEEP

    6144:eOPj2DfX0VSn3mZJRH3pyv9i0MTUC4+OpSLWg4:r2fk42H3pkE0MTj4LSa1

Malware Config

Targets

    • Target

      JaffaCakes118_497730398d40b55e7e969e8784b68a95

    • Size

      220KB

    • MD5

      497730398d40b55e7e969e8784b68a95

    • SHA1

      f0a84bc368acead6be937eae9192a7e24f878e46

    • SHA256

      71543c8e405705e9bbebc3f7f0d6bb954c0f4da8e00ead618ff263ed3ba144be

    • SHA512

      f1a72f2335daec7faa3e2a97abe0ce05a4f6946dd27fd2e635b4179ad240c05d3c5d77da0bd37f0c4d9e2834b74a9deea823aa8ab4fa99d52618df8babe04ecc

    • SSDEEP

      6144:eOPj2DfX0VSn3mZJRH3pyv9i0MTUC4+OpSLWg4:r2fk42H3pkE0MTj4LSa1

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks