General

  • Target

    JaffaCakes118_41b55e6a13f3393eb84fcb255b512cb9

  • Size

    188KB

  • Sample

    250302-whwzxazxex

  • MD5

    41b55e6a13f3393eb84fcb255b512cb9

  • SHA1

    907b5f824350fffac516f47fa1c43c8a98190642

  • SHA256

    2edb9a68bd575c2f1d9f2d56d9a81b46e6c262be81520a8510e2fbc14281f298

  • SHA512

    1fe7b5d5a26aa0a968c506bbe09367499773177e5b7f773df775b3ba4740f65bea30794164cc35bac0e452c776da19cdb0c4f5460f3c47f21e46fafd574b68ed

  • SSDEEP

    3072:BuynWZJKMIdsJMN/uHsYqmzT86aCpdKzemN2ZNZaBaKY:5nWZJKM+9mHh66aCpdKzemNQjyu

Malware Config

Targets

    • Target

      JaffaCakes118_41b55e6a13f3393eb84fcb255b512cb9

    • Size

      188KB

    • MD5

      41b55e6a13f3393eb84fcb255b512cb9

    • SHA1

      907b5f824350fffac516f47fa1c43c8a98190642

    • SHA256

      2edb9a68bd575c2f1d9f2d56d9a81b46e6c262be81520a8510e2fbc14281f298

    • SHA512

      1fe7b5d5a26aa0a968c506bbe09367499773177e5b7f773df775b3ba4740f65bea30794164cc35bac0e452c776da19cdb0c4f5460f3c47f21e46fafd574b68ed

    • SSDEEP

      3072:BuynWZJKMIdsJMN/uHsYqmzT86aCpdKzemN2ZNZaBaKY:5nWZJKM+9mHh66aCpdKzemNQjyu

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks