General

  • Target

    JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0

  • Size

    91KB

  • Sample

    250301-ppzk2sz1hv

  • MD5

    390de04570dc1151bb6e94b73fffe9b0

  • SHA1

    381829d8086eee00349f885ebd6953ffb5f296d1

  • SHA256

    0266c61236b0ada15d7b2141555398ebe14c70b2b836bed49e624bbcd7004531

  • SHA512

    d0d9297a084e2113a92f812167f2c684c076baeb186e97ece5c6627a21ca67c1744f6f464cb4478201dbd8d2f31b3dc6be052713d58ababf529ffbc15be642ed

  • SSDEEP

    1536:Qxe2q7nxZ785AIdeTRh0XhDq74rGNQF+U5xMPPc0c8HFpHuvSj38BN+x6SAS:Qxeh7ZIdeTRhH7mF+U5xMPE0c8HFln7/

Malware Config

Targets

    • Target

      JaffaCakes118_390de04570dc1151bb6e94b73fffe9b0

    • Size

      91KB

    • MD5

      390de04570dc1151bb6e94b73fffe9b0

    • SHA1

      381829d8086eee00349f885ebd6953ffb5f296d1

    • SHA256

      0266c61236b0ada15d7b2141555398ebe14c70b2b836bed49e624bbcd7004531

    • SHA512

      d0d9297a084e2113a92f812167f2c684c076baeb186e97ece5c6627a21ca67c1744f6f464cb4478201dbd8d2f31b3dc6be052713d58ababf529ffbc15be642ed

    • SSDEEP

      1536:Qxe2q7nxZ785AIdeTRh0XhDq74rGNQF+U5xMPPc0c8HFpHuvSj38BN+x6SAS:Qxeh7ZIdeTRhH7mF+U5xMPE0c8HFln7/

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks