General

  • Target

    JaffaCakes118_441ec2644d74080aeedce16d3e1e00f9

  • Size

    25.8MB

  • Sample

    250303-cyvbgatqt4

  • MD5

    441ec2644d74080aeedce16d3e1e00f9

  • SHA1

    41b6b9abd7aad25dcb5933f163872f0120d9ca7a

  • SHA256

    2210d6f71955a5a3a09a9e790a0bcf8ac3422517ea5371f8fe4aaa282e25ffd9

  • SHA512

    53b706fd57503d8877ed1ba1831b594d2acb5b2fa7c05bd46f1a91f059542daf6803b7bd72d1ce2b2d8b419ce3f30f52a7108e47b920ce8f373ab0aed7edfeef

  • SSDEEP

    3072:BKSqXrJnWqbwOr+lzDxDziZ4JTxHy+VdiO0MP2d8ve2IYoJtz:lUrJnWqb6lHxDGyJo+XTP3vdi

Malware Config

Targets

    • Target

      JaffaCakes118_441ec2644d74080aeedce16d3e1e00f9

    • Size

      25.8MB

    • MD5

      441ec2644d74080aeedce16d3e1e00f9

    • SHA1

      41b6b9abd7aad25dcb5933f163872f0120d9ca7a

    • SHA256

      2210d6f71955a5a3a09a9e790a0bcf8ac3422517ea5371f8fe4aaa282e25ffd9

    • SHA512

      53b706fd57503d8877ed1ba1831b594d2acb5b2fa7c05bd46f1a91f059542daf6803b7bd72d1ce2b2d8b419ce3f30f52a7108e47b920ce8f373ab0aed7edfeef

    • SSDEEP

      3072:BKSqXrJnWqbwOr+lzDxDziZ4JTxHy+VdiO0MP2d8ve2IYoJtz:lUrJnWqb6lHxDGyJo+XTP3vdi

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks