General

  • Target

    JaffaCakes118_4caae72ac0b1d2a5180b007f8fd770c2

  • Size

    175KB

  • Sample

    250304-lzfzxayj18

  • MD5

    4caae72ac0b1d2a5180b007f8fd770c2

  • SHA1

    da2b497207fe11182b82f703165c88ac5e0e6097

  • SHA256

    2e23527092214412682e1a357a5fe51f63ef36012dfdd579b95290bc861aefeb

  • SHA512

    7c3a3f0d7840b906ddca9c37ca99daa4dcca8a791ebb8bd0e1e1aa74516b01151945e87090e249cdc1ebc7bc1ff8886414d1a448a523394d0e7ecbc044f699d6

  • SSDEEP

    3072:+0SpUMepbCwVK2xCMS7lgjp8hRaqp3yVoUlfVvRvFdaXRjdUsO/j7fjHt8JGC:iUMIb9jxOgjWhRaU34VRhFdaXHXO/j7x

Malware Config

Targets

    • Target

      JaffaCakes118_4caae72ac0b1d2a5180b007f8fd770c2

    • Size

      175KB

    • MD5

      4caae72ac0b1d2a5180b007f8fd770c2

    • SHA1

      da2b497207fe11182b82f703165c88ac5e0e6097

    • SHA256

      2e23527092214412682e1a357a5fe51f63ef36012dfdd579b95290bc861aefeb

    • SHA512

      7c3a3f0d7840b906ddca9c37ca99daa4dcca8a791ebb8bd0e1e1aa74516b01151945e87090e249cdc1ebc7bc1ff8886414d1a448a523394d0e7ecbc044f699d6

    • SSDEEP

      3072:+0SpUMepbCwVK2xCMS7lgjp8hRaqp3yVoUlfVvRvFdaXRjdUsO/j7fjHt8JGC:iUMIb9jxOgjWhRaU34VRhFdaXHXO/j7x

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks