General

  • Target

    JaffaCakes118_51f8ff59a3ce7201ff6921e093ec3933

  • Size

    485KB

  • Sample

    250305-n63tcsyjs8

  • MD5

    51f8ff59a3ce7201ff6921e093ec3933

  • SHA1

    dc405a7ef054e706c2530e263658feceb0f9ebf0

  • SHA256

    695bf6eaa7063527c66636c5d69797a795bbe9a07f727a78d0ea0b015bf49c6f

  • SHA512

    319c2e316463dc1c6592e5952bc9eb9ee19bda1bab741b16d2ea93958203d921725e31cbcba550f29128db1b6f22dcdde46670fabe6c6a09fcaea4e84c5e33bc

  • SSDEEP

    6144:vEsgehtRZL02vIMP6lZSoXnuUEF9GCpiQ+EX+YL:dge3ROA9iLNX/it2e

Malware Config

Targets

    • Target

      JaffaCakes118_51f8ff59a3ce7201ff6921e093ec3933

    • Size

      485KB

    • MD5

      51f8ff59a3ce7201ff6921e093ec3933

    • SHA1

      dc405a7ef054e706c2530e263658feceb0f9ebf0

    • SHA256

      695bf6eaa7063527c66636c5d69797a795bbe9a07f727a78d0ea0b015bf49c6f

    • SHA512

      319c2e316463dc1c6592e5952bc9eb9ee19bda1bab741b16d2ea93958203d921725e31cbcba550f29128db1b6f22dcdde46670fabe6c6a09fcaea4e84c5e33bc

    • SSDEEP

      6144:vEsgehtRZL02vIMP6lZSoXnuUEF9GCpiQ+EX+YL:dge3ROA9iLNX/it2e

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks