General

  • Target

    JaffaCakes118_4bdc271e491cc879bd8db4913fc9872a

  • Size

    95KB

  • Sample

    250128-rqyq9a1ncx

  • MD5

    4bdc271e491cc879bd8db4913fc9872a

  • SHA1

    c2c56565c9c1bc2e39407d5da4987c275fe7d5b4

  • SHA256

    51fba53e2918547dac0a7c4f542ca0aec58343a607fad613f2cb749334e86fa9

  • SHA512

    4c4286f6abeda9aa95a484e2b0d8a2bb514fd7e6c5249b20a493075e710ea36caef1dbb9dd079d7100fb1a3b674d3bd991e1501f3d76ea85608d6515d7e8685b

  • SSDEEP

    1536:PrFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prgDxxOrL:PFS4jHS8q/3nTzePCwNUh4E9gDxwrL

Malware Config

Targets

    • Target

      JaffaCakes118_4bdc271e491cc879bd8db4913fc9872a

    • Size

      95KB

    • MD5

      4bdc271e491cc879bd8db4913fc9872a

    • SHA1

      c2c56565c9c1bc2e39407d5da4987c275fe7d5b4

    • SHA256

      51fba53e2918547dac0a7c4f542ca0aec58343a607fad613f2cb749334e86fa9

    • SHA512

      4c4286f6abeda9aa95a484e2b0d8a2bb514fd7e6c5249b20a493075e710ea36caef1dbb9dd079d7100fb1a3b674d3bd991e1501f3d76ea85608d6515d7e8685b

    • SSDEEP

      1536:PrFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prgDxxOrL:PFS4jHS8q/3nTzePCwNUh4E9gDxwrL

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks