General

  • Target

    JaffaCakes118_38b3d5d7debf9de1512e8423940f065e

  • Size

    95KB

  • Sample

    250301-nejamszpt6

  • MD5

    38b3d5d7debf9de1512e8423940f065e

  • SHA1

    48df0dda0b3ec8b69a7f8cbc002142be71838917

  • SHA256

    808d7208df6cebd677121c2dd9ed0e322ebc50e885132252dbb49f0a65d9b71f

  • SHA512

    deae428fbbc8a234c7e70724d25c88d4a334995911d3fbe4ebba6c68f9efca2b0d6a81f6e83ce834663670fe7392103db622261b59042311fc891b7db709532b

  • SSDEEP

    1536:hG0qFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prDX6qlRBlT:hPwS4jHS8q/3nTzePCwNUh4E9DX1zT

Malware Config

Targets

    • Target

      JaffaCakes118_38b3d5d7debf9de1512e8423940f065e

    • Size

      95KB

    • MD5

      38b3d5d7debf9de1512e8423940f065e

    • SHA1

      48df0dda0b3ec8b69a7f8cbc002142be71838917

    • SHA256

      808d7208df6cebd677121c2dd9ed0e322ebc50e885132252dbb49f0a65d9b71f

    • SHA512

      deae428fbbc8a234c7e70724d25c88d4a334995911d3fbe4ebba6c68f9efca2b0d6a81f6e83ce834663670fe7392103db622261b59042311fc891b7db709532b

    • SSDEEP

      1536:hG0qFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prDX6qlRBlT:hPwS4jHS8q/3nTzePCwNUh4E9DX1zT

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks