General

  • Target

    JaffaCakes118_509ad8b8d8381b5bbc699fdd0b817aaa

  • Size

    260KB

  • Sample

    250305-fjnf6azls2

  • MD5

    509ad8b8d8381b5bbc699fdd0b817aaa

  • SHA1

    03b9b72e915066dc261f4346a5028520218203af

  • SHA256

    9669ec9b614e3433c89f3911c42ad1bbfe91f88d1f8e24c5b866801bbc114035

  • SHA512

    25a943796bf5e946d93d40aac5c323ccaa3ce6e6c9b5823d7513826539adc89f9d0b49294f5234773850d28dfb452e866feca70b9d4b38dd3a2ad996689f4fc2

  • SSDEEP

    3072:Ka4UgD6dpIpbpq+JqS+0dv3nCfEgljD7tN9on4WcGeiLPDQqkVdbSjoudEEw+VkZ:tgeYbH5YMYN3O4WcZBdYHEzodHEe4Ca

Malware Config

Targets

    • Target

      JaffaCakes118_509ad8b8d8381b5bbc699fdd0b817aaa

    • Size

      260KB

    • MD5

      509ad8b8d8381b5bbc699fdd0b817aaa

    • SHA1

      03b9b72e915066dc261f4346a5028520218203af

    • SHA256

      9669ec9b614e3433c89f3911c42ad1bbfe91f88d1f8e24c5b866801bbc114035

    • SHA512

      25a943796bf5e946d93d40aac5c323ccaa3ce6e6c9b5823d7513826539adc89f9d0b49294f5234773850d28dfb452e866feca70b9d4b38dd3a2ad996689f4fc2

    • SSDEEP

      3072:Ka4UgD6dpIpbpq+JqS+0dv3nCfEgljD7tN9on4WcGeiLPDQqkVdbSjoudEEw+VkZ:tgeYbH5YMYN3O4WcZBdYHEzodHEe4Ca

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks