General

  • Target

    JaffaCakes118_4a44b5836d25a8d3807904c70f72e1cd

  • Size

    95KB

  • Sample

    250128-nclmzswrf1

  • MD5

    4a44b5836d25a8d3807904c70f72e1cd

  • SHA1

    710c47f410c9ff8bb19c8ccf6e60f2ab457a5c74

  • SHA256

    84c62b26f3aecbd61e19e7c21d9db9785c51f9eceeb86daaec2feb81687cfe58

  • SHA512

    a679f669fb877f30abc5a7b3f1b74e9074b4ad769ba1f53a858015c70146ca806999c96e4936bcc337483cf8ad3e5ca03d200319808fcb5b9670e217932f830f

  • SSDEEP

    1536:5KFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prg26Bx5HYU:5QS4jHS8q/3nTzePCwNUh4E9gHv5HYU

Malware Config

Targets

    • Target

      JaffaCakes118_4a44b5836d25a8d3807904c70f72e1cd

    • Size

      95KB

    • MD5

      4a44b5836d25a8d3807904c70f72e1cd

    • SHA1

      710c47f410c9ff8bb19c8ccf6e60f2ab457a5c74

    • SHA256

      84c62b26f3aecbd61e19e7c21d9db9785c51f9eceeb86daaec2feb81687cfe58

    • SHA512

      a679f669fb877f30abc5a7b3f1b74e9074b4ad769ba1f53a858015c70146ca806999c96e4936bcc337483cf8ad3e5ca03d200319808fcb5b9670e217932f830f

    • SSDEEP

      1536:5KFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prg26Bx5HYU:5QS4jHS8q/3nTzePCwNUh4E9gHv5HYU

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks