General

  • Target

    JaffaCakes118_3d68e293144db83286830bed7414bc45

  • Size

    95KB

  • Sample

    250302-ddjvnssm19

  • MD5

    3d68e293144db83286830bed7414bc45

  • SHA1

    ba2e6f90eb78eba487dbbf6a8505f2edd7f54111

  • SHA256

    640582d2222bb18a52c19d6ba561f78466670016a633ec5409cda3bf10c56503

  • SHA512

    70b6fece2e19afd4226a0c83d006989ef8bd57e4b5a1369dcbe4fcab3a356c2debfa5668d8881d0f2a30b4f865f53615881f1986909cd6422ac8f36dae4a6a23

  • SSDEEP

    1536:QuJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prEWnFY2UHHCssax:QufS4jHS8q/3nTzePCwNUh4E9E0W2mCm

Malware Config

Targets

    • Target

      JaffaCakes118_3d68e293144db83286830bed7414bc45

    • Size

      95KB

    • MD5

      3d68e293144db83286830bed7414bc45

    • SHA1

      ba2e6f90eb78eba487dbbf6a8505f2edd7f54111

    • SHA256

      640582d2222bb18a52c19d6ba561f78466670016a633ec5409cda3bf10c56503

    • SHA512

      70b6fece2e19afd4226a0c83d006989ef8bd57e4b5a1369dcbe4fcab3a356c2debfa5668d8881d0f2a30b4f865f53615881f1986909cd6422ac8f36dae4a6a23

    • SSDEEP

      1536:QuJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prEWnFY2UHHCssax:QufS4jHS8q/3nTzePCwNUh4E9E0W2mCm

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks