General

  • Target

    JaffaCakes118_3bae5c1fb9a66703f0cc8c3c255cd333

  • Size

    253KB

  • Sample

    250301-z85arasybv

  • MD5

    3bae5c1fb9a66703f0cc8c3c255cd333

  • SHA1

    564ccf39eaefda87a408f169f8a37df29edaace1

  • SHA256

    3650b1ce36dd6afdd96c0b1edca56a2c1f8a5a1f75a26e3ff4b29c05bdf8447d

  • SHA512

    5169489a8e3f6751bdbfcee2e1b097bf27249b71c3d37370a4ae452accff8bd43572cd0df86dce2f5ac2582e066fa9747631b1827e126e01fae42ca320691145

  • SSDEEP

    6144:tZLJvAIYTY9n+aCyIK3ccnMxj/kg8XVUvDrTV:t5JvpW1K3DnsDkiDPV

Malware Config

Targets

    • Target

      JaffaCakes118_3bae5c1fb9a66703f0cc8c3c255cd333

    • Size

      253KB

    • MD5

      3bae5c1fb9a66703f0cc8c3c255cd333

    • SHA1

      564ccf39eaefda87a408f169f8a37df29edaace1

    • SHA256

      3650b1ce36dd6afdd96c0b1edca56a2c1f8a5a1f75a26e3ff4b29c05bdf8447d

    • SHA512

      5169489a8e3f6751bdbfcee2e1b097bf27249b71c3d37370a4ae452accff8bd43572cd0df86dce2f5ac2582e066fa9747631b1827e126e01fae42ca320691145

    • SSDEEP

      6144:tZLJvAIYTY9n+aCyIK3ccnMxj/kg8XVUvDrTV:t5JvpW1K3DnsDkiDPV

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks