General

  • Target

    JaffaCakes118_4a3857ce4008227d79e9b340e734ba87

  • Size

    96KB

  • Sample

    250128-m9mqwawrbs

  • MD5

    4a3857ce4008227d79e9b340e734ba87

  • SHA1

    511f21dc802a3da638d13a2b03d7c3dc3e1e1a93

  • SHA256

    4f9c2f7f95bb30f624dbc49c9e69b09e84620aa76fdf47c14b1fb334b5a224be

  • SHA512

    5be43dc7514fee7254b321bc01144f0eddcf18da817f144280fc9b388eb92a5aa2d4b38f41c2122eac0830cf1dc873de320d103791a09971786d9c470d68e5a8

  • SSDEEP

    1536:jSFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnUqiG05Q:jYS4jHS8q/3nTzePCwNUh4E9nDih5Q

Malware Config

Targets

    • Target

      JaffaCakes118_4a3857ce4008227d79e9b340e734ba87

    • Size

      96KB

    • MD5

      4a3857ce4008227d79e9b340e734ba87

    • SHA1

      511f21dc802a3da638d13a2b03d7c3dc3e1e1a93

    • SHA256

      4f9c2f7f95bb30f624dbc49c9e69b09e84620aa76fdf47c14b1fb334b5a224be

    • SHA512

      5be43dc7514fee7254b321bc01144f0eddcf18da817f144280fc9b388eb92a5aa2d4b38f41c2122eac0830cf1dc873de320d103791a09971786d9c470d68e5a8

    • SSDEEP

      1536:jSFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnUqiG05Q:jYS4jHS8q/3nTzePCwNUh4E9nDih5Q

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks