General

  • Target

    JaffaCakes118_4a8e5f1b206d3a33926341a4d8fd36ff

  • Size

    327KB

  • Sample

    250304-ctyhbsxjz2

  • MD5

    4a8e5f1b206d3a33926341a4d8fd36ff

  • SHA1

    280bc3211989157eb372a56378487b3c0d63cf7e

  • SHA256

    88a2b6b33b1932f948342c45113ca521552bdd3ee887026ffc11665f774471bb

  • SHA512

    fadc81ef689177d3ec6d3f9242058eca5b8ce55060d93074f7554a77ebf7ed7dc5ce9734f5bbfe27ef75df7925302bd6731678a7c5cd4064986541d7e38480a5

  • SSDEEP

    6144:vEsgehtRZL02vIMP6lZSoXnuUEF9GCpiQ+E2:dge3ROA9iLNX/it2N

Malware Config

Targets

    • Target

      JaffaCakes118_4a8e5f1b206d3a33926341a4d8fd36ff

    • Size

      327KB

    • MD5

      4a8e5f1b206d3a33926341a4d8fd36ff

    • SHA1

      280bc3211989157eb372a56378487b3c0d63cf7e

    • SHA256

      88a2b6b33b1932f948342c45113ca521552bdd3ee887026ffc11665f774471bb

    • SHA512

      fadc81ef689177d3ec6d3f9242058eca5b8ce55060d93074f7554a77ebf7ed7dc5ce9734f5bbfe27ef75df7925302bd6731678a7c5cd4064986541d7e38480a5

    • SSDEEP

      6144:vEsgehtRZL02vIMP6lZSoXnuUEF9GCpiQ+E2:dge3ROA9iLNX/it2N

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks