General

  • Target

    JaffaCakes118_393e1cfc5f1d0248963abed70bb626ca

  • Size

    223KB

  • Sample

    250301-qk6dgasm12

  • MD5

    393e1cfc5f1d0248963abed70bb626ca

  • SHA1

    50d3cf37fe3f6c84112a6a17f456b218b399e3d0

  • SHA256

    63f80672c1b11ab94891a49457431f24a877e9fda4e30c3b77cfa2e685002137

  • SHA512

    ff2de701f57d407bed5bbafde0ae06c442b3d7e743be33efd63d383cc57e68332376fb3510278b86a3490150a73ef1c5952f6317739871d8a3dc1f14fff8fbb5

  • SSDEEP

    3072:v0d4QqqDCpMYi8v0uAf1nR7+Xqw7fEcK8LQohBBd1zfAdv+MZJT65ZUzA39YdmWU:M9qq+q8cFkLrSvlN65ZUzK9cBkZ

Malware Config

Targets

    • Target

      JaffaCakes118_393e1cfc5f1d0248963abed70bb626ca

    • Size

      223KB

    • MD5

      393e1cfc5f1d0248963abed70bb626ca

    • SHA1

      50d3cf37fe3f6c84112a6a17f456b218b399e3d0

    • SHA256

      63f80672c1b11ab94891a49457431f24a877e9fda4e30c3b77cfa2e685002137

    • SHA512

      ff2de701f57d407bed5bbafde0ae06c442b3d7e743be33efd63d383cc57e68332376fb3510278b86a3490150a73ef1c5952f6317739871d8a3dc1f14fff8fbb5

    • SSDEEP

      3072:v0d4QqqDCpMYi8v0uAf1nR7+Xqw7fEcK8LQohBBd1zfAdv+MZJT65ZUzA39YdmWU:M9qq+q8cFkLrSvlN65ZUzK9cBkZ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks