General

  • Target

    JaffaCakes118_4e68a2a9d5a9da39f109375c1aba46a1

  • Size

    94KB

  • Sample

    250304-tvtdfavpz4

  • MD5

    4e68a2a9d5a9da39f109375c1aba46a1

  • SHA1

    b21d23bad0cf6bf7a6670ddcbc2cfdf82d9cb9cf

  • SHA256

    0ffcf362ba01ad54b1050a6524f8af5abbf509b070cea29e5cbcc2057a872453

  • SHA512

    b236a97fcab45b3b353444870b3f2094ab9708475f01569e46c6db3f20c656946ead8c0ff076eab6c84f606ac2f8f864ff5d91fac10882fecb67d6d6d4c80218

  • SSDEEP

    1536:f9/qFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prsTAIatN:f9/wS4jHS8q/3nTzePCwNUh4E9sK

Malware Config

Targets

    • Target

      JaffaCakes118_4e68a2a9d5a9da39f109375c1aba46a1

    • Size

      94KB

    • MD5

      4e68a2a9d5a9da39f109375c1aba46a1

    • SHA1

      b21d23bad0cf6bf7a6670ddcbc2cfdf82d9cb9cf

    • SHA256

      0ffcf362ba01ad54b1050a6524f8af5abbf509b070cea29e5cbcc2057a872453

    • SHA512

      b236a97fcab45b3b353444870b3f2094ab9708475f01569e46c6db3f20c656946ead8c0ff076eab6c84f606ac2f8f864ff5d91fac10882fecb67d6d6d4c80218

    • SSDEEP

      1536:f9/qFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prsTAIatN:f9/wS4jHS8q/3nTzePCwNUh4E9sK

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks