General

  • Target

    JaffaCakes118_4f4c0afe58f981a8868e4c687178406b

  • Size

    206KB

  • Sample

    250304-yhzrxazjs2

  • MD5

    4f4c0afe58f981a8868e4c687178406b

  • SHA1

    f4ea76da62501da125f591a1d42445f9e72c6c53

  • SHA256

    ea34db58698de2e2c7a31f2f09047cabb060c8f7f5cd7465700227d72d95c184

  • SHA512

    b684aede120eec29ed895fb2a985a6b87b862e33779c9c1940aff7e6f74c5305fc5758f89868a9d7e09e47dde0ef1e29d437692441b17c4f5a1d8b7c49d3a540

  • SSDEEP

    3072:AbTlz5mJnWa3HCNR7dH8yW1u5eO7P3qUkjTne8/5xzE:EAJnWa3iX5W85eJve8x5E

Malware Config

Targets

    • Target

      JaffaCakes118_4f4c0afe58f981a8868e4c687178406b

    • Size

      206KB

    • MD5

      4f4c0afe58f981a8868e4c687178406b

    • SHA1

      f4ea76da62501da125f591a1d42445f9e72c6c53

    • SHA256

      ea34db58698de2e2c7a31f2f09047cabb060c8f7f5cd7465700227d72d95c184

    • SHA512

      b684aede120eec29ed895fb2a985a6b87b862e33779c9c1940aff7e6f74c5305fc5758f89868a9d7e09e47dde0ef1e29d437692441b17c4f5a1d8b7c49d3a540

    • SSDEEP

      3072:AbTlz5mJnWa3HCNR7dH8yW1u5eO7P3qUkjTne8/5xzE:EAJnWa3iX5W85eJve8x5E

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks