General

  • Target

    JaffaCakes118_51ce81276e302293b40ea85fde308cda

  • Size

    184KB

  • Sample

    250305-m8lr7aw1aw

  • MD5

    51ce81276e302293b40ea85fde308cda

  • SHA1

    f3239817372cb9e64296f7b994bea72611039110

  • SHA256

    325a55118b9c12f2323b6f952d2d5b7af46c1df5dc61f0f51ba763b00a42f279

  • SHA512

    3684d7fa864d0488b09a3eac0f1ecdc4e88c7d21307cc9d19493247f9e8e3e1c6ed67e4c15321fadb05adb90aaf4853f4e9559ca0d0aa1cbff735a45d79b0124

  • SSDEEP

    3072:oR282m9KOPIj+eL9RDQFFrXsbs1e2KKxuR+4/K/xr8tYs5oGff7GVqUpCs:/vm5B7nru04/oYtYxGff7yO

Malware Config

Targets

    • Target

      JaffaCakes118_51ce81276e302293b40ea85fde308cda

    • Size

      184KB

    • MD5

      51ce81276e302293b40ea85fde308cda

    • SHA1

      f3239817372cb9e64296f7b994bea72611039110

    • SHA256

      325a55118b9c12f2323b6f952d2d5b7af46c1df5dc61f0f51ba763b00a42f279

    • SHA512

      3684d7fa864d0488b09a3eac0f1ecdc4e88c7d21307cc9d19493247f9e8e3e1c6ed67e4c15321fadb05adb90aaf4853f4e9559ca0d0aa1cbff735a45d79b0124

    • SSDEEP

      3072:oR282m9KOPIj+eL9RDQFFrXsbs1e2KKxuR+4/K/xr8tYs5oGff7GVqUpCs:/vm5B7nru04/oYtYxGff7yO

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks