General

  • Target

    JaffaCakes118_4fb88fbffa77c64f0de9334c63f3822b

  • Size

    192KB

  • Sample

    250304-1jlb1s1ybt

  • MD5

    4fb88fbffa77c64f0de9334c63f3822b

  • SHA1

    5a3c434345cb977442ad6588264632cdba641d66

  • SHA256

    53cdf65992d6d9746d57864e4ae91eff03700c493607948f63e4687dc9a2c54d

  • SHA512

    abf05a6bbfd2b28c297519ce4e50873797f7ccec02aca6c77f108387e0eb3d6d50e5c6f4203735c8097b1a4c6bc4c848307c40c88d0a2288ee373d29aa7b8596

  • SSDEEP

    3072:5B1PFJunGnFQFT4zFcnH/+RHMX3UHA/Jrz4fgKcVKG7NDJAA0hVj1ZU5yJ:JPFJunGnOFT4mSsWqHF7QAM1q5g

Malware Config

Targets

    • Target

      JaffaCakes118_4fb88fbffa77c64f0de9334c63f3822b

    • Size

      192KB

    • MD5

      4fb88fbffa77c64f0de9334c63f3822b

    • SHA1

      5a3c434345cb977442ad6588264632cdba641d66

    • SHA256

      53cdf65992d6d9746d57864e4ae91eff03700c493607948f63e4687dc9a2c54d

    • SHA512

      abf05a6bbfd2b28c297519ce4e50873797f7ccec02aca6c77f108387e0eb3d6d50e5c6f4203735c8097b1a4c6bc4c848307c40c88d0a2288ee373d29aa7b8596

    • SSDEEP

      3072:5B1PFJunGnFQFT4zFcnH/+RHMX3UHA/Jrz4fgKcVKG7NDJAA0hVj1ZU5yJ:JPFJunGnOFT4mSsWqHF7QAM1q5g

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks