General

  • Target

    JaffaCakes118_51210ca6a630e9861f566af0209fb45f

  • Size

    96KB

  • Sample

    250305-jdbf7aswb1

  • MD5

    51210ca6a630e9861f566af0209fb45f

  • SHA1

    7db4bb1299dd15c9eea49b394102aa9e8232411c

  • SHA256

    f059e8e88b0242263305e172331821bc051ac83e62af6c856c06ae9af11d6b39

  • SHA512

    1a34631636d5eb6987f18651195cf81b5fce2ad9f5644a626865fac9003071d6abdde7f814570b348c108da532682cb85fb44fbc57a35e2891b65fa73f8fed05

  • SSDEEP

    3072:9hS4jHS8q/3nTzePCwNUh4E9UFt63Q2/6:9c428q/nTzePCwG7UFo3y

Malware Config

Targets

    • Target

      JaffaCakes118_51210ca6a630e9861f566af0209fb45f

    • Size

      96KB

    • MD5

      51210ca6a630e9861f566af0209fb45f

    • SHA1

      7db4bb1299dd15c9eea49b394102aa9e8232411c

    • SHA256

      f059e8e88b0242263305e172331821bc051ac83e62af6c856c06ae9af11d6b39

    • SHA512

      1a34631636d5eb6987f18651195cf81b5fce2ad9f5644a626865fac9003071d6abdde7f814570b348c108da532682cb85fb44fbc57a35e2891b65fa73f8fed05

    • SSDEEP

      3072:9hS4jHS8q/3nTzePCwNUh4E9UFt63Q2/6:9c428q/nTzePCwG7UFo3y

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks