General

  • Target

    JaffaCakes118_53f11c76f6e05c679e70d2ab9d4ba353

  • Size

    204KB

  • Sample

    250305-2w8thsskz5

  • MD5

    53f11c76f6e05c679e70d2ab9d4ba353

  • SHA1

    17c8459738ed13f8997cc8e69a71769e68d1f250

  • SHA256

    7392f70b4c927b4411f9ed3e40603bdf7d4ed89ebd283013cff41e968387cab4

  • SHA512

    6fc00e9b5f015873191a6bb2125e9945f61ff47c391dc31a8a78b2aaedc784837b15be24305f5a4db146bc3475fb66d98f6c3529f97b0aa9714cea27e074d549

  • SSDEEP

    6144:isItKnW8QWBTyPRqyhYPbncTBlhHrtndnkv0oX:vtW8CJq8YPbncT30

Malware Config

Targets

    • Target

      JaffaCakes118_53f11c76f6e05c679e70d2ab9d4ba353

    • Size

      204KB

    • MD5

      53f11c76f6e05c679e70d2ab9d4ba353

    • SHA1

      17c8459738ed13f8997cc8e69a71769e68d1f250

    • SHA256

      7392f70b4c927b4411f9ed3e40603bdf7d4ed89ebd283013cff41e968387cab4

    • SHA512

      6fc00e9b5f015873191a6bb2125e9945f61ff47c391dc31a8a78b2aaedc784837b15be24305f5a4db146bc3475fb66d98f6c3529f97b0aa9714cea27e074d549

    • SSDEEP

      6144:isItKnW8QWBTyPRqyhYPbncTBlhHrtndnkv0oX:vtW8CJq8YPbncT30

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks