General

  • Target

    JaffaCakes118_49d1b5fde2e77033d6fd58e486ab3aef

  • Size

    387KB

  • Sample

    250128-mfwrpawje1

  • MD5

    49d1b5fde2e77033d6fd58e486ab3aef

  • SHA1

    ffadf7142aab43a6fb061304fee0f87f4f06275d

  • SHA256

    46afedf403f590821fa2bbc46f2be0fc7033fff76be68548c5360b64e9e53761

  • SHA512

    93ab871320e5c60ca91bba982d7b20a24d51743cd7d847476110bf314b4c45cb68e694a9123d48afbcc1488579ef971b93038394c4bcf5fe946b346b041716f9

  • SSDEEP

    6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQd3klWqAc:kbB5jfgexjrOA9NRPmxwX/itFO

Malware Config

Targets

    • Target

      JaffaCakes118_49d1b5fde2e77033d6fd58e486ab3aef

    • Size

      387KB

    • MD5

      49d1b5fde2e77033d6fd58e486ab3aef

    • SHA1

      ffadf7142aab43a6fb061304fee0f87f4f06275d

    • SHA256

      46afedf403f590821fa2bbc46f2be0fc7033fff76be68548c5360b64e9e53761

    • SHA512

      93ab871320e5c60ca91bba982d7b20a24d51743cd7d847476110bf314b4c45cb68e694a9123d48afbcc1488579ef971b93038394c4bcf5fe946b346b041716f9

    • SSDEEP

      6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQd3klWqAc:kbB5jfgexjrOA9NRPmxwX/itFO

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks