General

  • Target

    JaffaCakes118_47a6285bbf0b7469e44ef9b81d063f87

  • Size

    517KB

  • Sample

    250303-sgatha1lx6

  • MD5

    47a6285bbf0b7469e44ef9b81d063f87

  • SHA1

    c46ffb95596ded5e0a6e9b1c74d44f162b61dfc0

  • SHA256

    8e8c707c7c3ae865d6a7b2f652af08f3154dc7ac20a80778e9748fa319e2f39f

  • SHA512

    79589c2c9debd0a2bdae157aef462d69688f2bb966abcc0c4f5f2a61683165b2ff6aaadf5ed3540746705d7eb9fbaf945fc53791fe9cbebcd01206e9d9ff9677

  • SSDEEP

    6144:J00geEaFb79FR1eTboMMnIroSe5Kvf8QLBBzAM+GuN8QpKPiTcVZQP:J00geEaF1L5tSeMlLbzL+jkq

Malware Config

Targets

    • Target

      JaffaCakes118_47a6285bbf0b7469e44ef9b81d063f87

    • Size

      517KB

    • MD5

      47a6285bbf0b7469e44ef9b81d063f87

    • SHA1

      c46ffb95596ded5e0a6e9b1c74d44f162b61dfc0

    • SHA256

      8e8c707c7c3ae865d6a7b2f652af08f3154dc7ac20a80778e9748fa319e2f39f

    • SHA512

      79589c2c9debd0a2bdae157aef462d69688f2bb966abcc0c4f5f2a61683165b2ff6aaadf5ed3540746705d7eb9fbaf945fc53791fe9cbebcd01206e9d9ff9677

    • SSDEEP

      6144:J00geEaFb79FR1eTboMMnIroSe5Kvf8QLBBzAM+GuN8QpKPiTcVZQP:J00geEaF1L5tSeMlLbzL+jkq

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks