General

  • Target

    JaffaCakes118_518d7eaf92eb9c295ad8bd0a443fafe3

  • Size

    96KB

  • Sample

    250305-lqjpfawjw7

  • MD5

    518d7eaf92eb9c295ad8bd0a443fafe3

  • SHA1

    ff605b5c4261a6a5e49060edaf5f70e8719b6032

  • SHA256

    32392984f2b574a0c62e743e7b80d97bc41b0b5889d86c728037fc0940675805

  • SHA512

    a4e6c967a97de41a00b22145fe457ba42f81cf3ac61217cdafb580007678247ec25a0f50a043b2cd15c3eb82138cde74812af57c3e8d1c76c596121684761b6c

  • SSDEEP

    1536:2RFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prxIZtCb:2HS4jHS8q/3nTzePCwNUh4E9uZtCb

Malware Config

Targets

    • Target

      JaffaCakes118_518d7eaf92eb9c295ad8bd0a443fafe3

    • Size

      96KB

    • MD5

      518d7eaf92eb9c295ad8bd0a443fafe3

    • SHA1

      ff605b5c4261a6a5e49060edaf5f70e8719b6032

    • SHA256

      32392984f2b574a0c62e743e7b80d97bc41b0b5889d86c728037fc0940675805

    • SHA512

      a4e6c967a97de41a00b22145fe457ba42f81cf3ac61217cdafb580007678247ec25a0f50a043b2cd15c3eb82138cde74812af57c3e8d1c76c596121684761b6c

    • SSDEEP

      1536:2RFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prxIZtCb:2HS4jHS8q/3nTzePCwNUh4E9uZtCb

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks