General

  • Target

    JaffaCakes118_4ff60eef0ac253e4c4f2daecfd5980df

  • Size

    22.7MB

  • Sample

    250305-ca8h7avwct

  • MD5

    4ff60eef0ac253e4c4f2daecfd5980df

  • SHA1

    a7a6d4f7b33dab45a82cffc6e3f9357a0f79d174

  • SHA256

    2dab9d1dad41a8f0428ee783e98c8ba299e6fd8420e578bd3fbecc5d2ca0fe5a

  • SHA512

    f4a8bfcfee5a27b3b844b5e6c6e938554b7ebf6b403f02e796c5b4a5950afa7473dc33887784ba6a4fa2a3dcbe77ea8880d692c8da768f060cd62e87341b64bb

  • SSDEEP

    3072:BKSqXrJnWqbwOuVQYVlydB7RhXJmyhQtsbGCV9OawNqddkTNAPYT5g7yQgTatp:lUrJnWqbHZRh5HhiIGZaDdkTNAPYm7gw

Malware Config

Targets

    • Target

      JaffaCakes118_4ff60eef0ac253e4c4f2daecfd5980df

    • Size

      22.7MB

    • MD5

      4ff60eef0ac253e4c4f2daecfd5980df

    • SHA1

      a7a6d4f7b33dab45a82cffc6e3f9357a0f79d174

    • SHA256

      2dab9d1dad41a8f0428ee783e98c8ba299e6fd8420e578bd3fbecc5d2ca0fe5a

    • SHA512

      f4a8bfcfee5a27b3b844b5e6c6e938554b7ebf6b403f02e796c5b4a5950afa7473dc33887784ba6a4fa2a3dcbe77ea8880d692c8da768f060cd62e87341b64bb

    • SSDEEP

      3072:BKSqXrJnWqbwOuVQYVlydB7RhXJmyhQtsbGCV9OawNqddkTNAPYT5g7yQgTatp:lUrJnWqbHZRh5HhiIGZaDdkTNAPYm7gw

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks