General

  • Target

    JaffaCakes118_5199ea9d09658473c4d15ca45b95db22

  • Size

    122KB

  • Sample

    250305-l3eagswlw9

  • MD5

    5199ea9d09658473c4d15ca45b95db22

  • SHA1

    ea5bcb19d806eb2817c8836943e3f3cb12c24607

  • SHA256

    3627b0fb792ecbfc67c827a797b1c268c9da1856d10cc35bbed24b17a17c8b89

  • SHA512

    55b319cae6b10fec3b18f7924d663137232737014e85a32ce598dcb68762bbe0607b1c1a006f1fbf0f69d3e771a815a8069964b99f71ea06e6a2d5adc6fabf37

  • SSDEEP

    3072:8Lk395hYXJ0K0i8IUSK9IxDti4+ez011uuSFssxaw0Dsp8:8QqArIUSK9Ihth01eaip8

Malware Config

Targets

    • Target

      JaffaCakes118_5199ea9d09658473c4d15ca45b95db22

    • Size

      122KB

    • MD5

      5199ea9d09658473c4d15ca45b95db22

    • SHA1

      ea5bcb19d806eb2817c8836943e3f3cb12c24607

    • SHA256

      3627b0fb792ecbfc67c827a797b1c268c9da1856d10cc35bbed24b17a17c8b89

    • SHA512

      55b319cae6b10fec3b18f7924d663137232737014e85a32ce598dcb68762bbe0607b1c1a006f1fbf0f69d3e771a815a8069964b99f71ea06e6a2d5adc6fabf37

    • SSDEEP

      3072:8Lk395hYXJ0K0i8IUSK9IxDti4+ez011uuSFssxaw0Dsp8:8QqArIUSK9Ihth01eaip8

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks