General

  • Target

    JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e

  • Size

    275KB

  • Sample

    250305-edz3bsxr19

  • MD5

    505e0c2c5759b10808c9b29546a3aa0e

  • SHA1

    86e7cfd584af0bea278ac30f0ddc1e861282637d

  • SHA256

    ec3e374deb438ad64a5982cf0f120df981d5d9d35aeef0387a9e215e9f408fde

  • SHA512

    4455b5274e77df224d225d9d68bd73e6533c9e8d2ece75461798161a8feabfb888fdbb2238e044610d50f40d6bba064a894114880fa1ba0c67c60133a9cebfc2

  • SSDEEP

    6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdgq:kbB5jfgexjrOA9NRPmxwX/itFR

Malware Config

Targets

    • Target

      JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e

    • Size

      275KB

    • MD5

      505e0c2c5759b10808c9b29546a3aa0e

    • SHA1

      86e7cfd584af0bea278ac30f0ddc1e861282637d

    • SHA256

      ec3e374deb438ad64a5982cf0f120df981d5d9d35aeef0387a9e215e9f408fde

    • SHA512

      4455b5274e77df224d225d9d68bd73e6533c9e8d2ece75461798161a8feabfb888fdbb2238e044610d50f40d6bba064a894114880fa1ba0c67c60133a9cebfc2

    • SSDEEP

      6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdgq:kbB5jfgexjrOA9NRPmxwX/itFR

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks