General

  • Target

    JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6

  • Size

    5.0MB

  • Sample

    250305-zlm3ysysdv

  • MD5

    5392164e0cb5045847c4ee9cff4813f6

  • SHA1

    20f55805079a0c35ce493589335fce990c8e708a

  • SHA256

    bea5b55cdef955ac7b8a9fead52ddc7f659fa3470c470fd36e769d1b57c5234e

  • SHA512

    82f0cf0a85ec7164dbcd442c33e969186e8ddb179707b053fb0ac91f09891bd2196f9e8499cd3ab903a3262f7f334a82916b150b18dab29c84c7d04fd6c4987a

  • SSDEEP

    49152:smv3GY5fa22GFbn0iDenAPpv//e2zzoM/IFnLA5:s0W2SLGFD0i0UPe2N/YLA5

Malware Config

Targets

    • Target

      JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6

    • Size

      5.0MB

    • MD5

      5392164e0cb5045847c4ee9cff4813f6

    • SHA1

      20f55805079a0c35ce493589335fce990c8e708a

    • SHA256

      bea5b55cdef955ac7b8a9fead52ddc7f659fa3470c470fd36e769d1b57c5234e

    • SHA512

      82f0cf0a85ec7164dbcd442c33e969186e8ddb179707b053fb0ac91f09891bd2196f9e8499cd3ab903a3262f7f334a82916b150b18dab29c84c7d04fd6c4987a

    • SSDEEP

      49152:smv3GY5fa22GFbn0iDenAPpv//e2zzoM/IFnLA5:s0W2SLGFD0i0UPe2N/YLA5

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks