General

  • Target

    JaffaCakes118_51acce6c0ffe9c5eaac2f99a5547e538

  • Size

    96KB

  • Sample

    250305-mg8gwawvat

  • MD5

    51acce6c0ffe9c5eaac2f99a5547e538

  • SHA1

    054f5fdef50e290f9dc6bb3fd01c04609eb4a2be

  • SHA256

    32ab40a2a278d102e9f4334a411529e35207a51902a54c2ce44d7566c31a0ca0

  • SHA512

    eec44e81d134573eb6b6c59b9adbcd2102d7e7db07e36de756f7cf9d675141e4e0fe905dcda0345cc0355e1dd417527b1c60551a53096c2169caa897c16780cd

  • SSDEEP

    1536:WAFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prYAFz2q3:WyS4jHS8q/3nTzePCwNUh4E9bJ2q3

Malware Config

Targets

    • Target

      JaffaCakes118_51acce6c0ffe9c5eaac2f99a5547e538

    • Size

      96KB

    • MD5

      51acce6c0ffe9c5eaac2f99a5547e538

    • SHA1

      054f5fdef50e290f9dc6bb3fd01c04609eb4a2be

    • SHA256

      32ab40a2a278d102e9f4334a411529e35207a51902a54c2ce44d7566c31a0ca0

    • SHA512

      eec44e81d134573eb6b6c59b9adbcd2102d7e7db07e36de756f7cf9d675141e4e0fe905dcda0345cc0355e1dd417527b1c60551a53096c2169caa897c16780cd

    • SSDEEP

      1536:WAFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prYAFz2q3:WyS4jHS8q/3nTzePCwNUh4E9bJ2q3

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks