General

  • Target

    JaffaCakes118_39ffd3ffb23d9ea5ba54397a15865fdf

  • Size

    96KB

  • Sample

    250301-tfl1tavwey

  • MD5

    39ffd3ffb23d9ea5ba54397a15865fdf

  • SHA1

    0be1916cf3438fac6c36101ce5e1016b647e3961

  • SHA256

    1424e28b0f59490d026088f3f96ba1c0380df75dafb31d15a5526b81c8aea26d

  • SHA512

    b09b61a8d4abd8a24896c1c1c7f9d3f7aeff1df84ab8f46d51cc9e76ef0b01bf31623a2094e1affd2b363868330e84b0d0ecd5a69295817e9afdb2e1d45728bd

  • SSDEEP

    1536:0iFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnKlekv4gdYu:0IS4jHS8q/3nTzePCwNUh4E9n1K4gdD

Malware Config

Targets

    • Target

      JaffaCakes118_39ffd3ffb23d9ea5ba54397a15865fdf

    • Size

      96KB

    • MD5

      39ffd3ffb23d9ea5ba54397a15865fdf

    • SHA1

      0be1916cf3438fac6c36101ce5e1016b647e3961

    • SHA256

      1424e28b0f59490d026088f3f96ba1c0380df75dafb31d15a5526b81c8aea26d

    • SHA512

      b09b61a8d4abd8a24896c1c1c7f9d3f7aeff1df84ab8f46d51cc9e76ef0b01bf31623a2094e1affd2b363868330e84b0d0ecd5a69295817e9afdb2e1d45728bd

    • SSDEEP

      1536:0iFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnKlekv4gdYu:0IS4jHS8q/3nTzePCwNUh4E9n1K4gdD

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks