General

  • Target

    JaffaCakes118_57da45c67b2ce89876a2180cb6f1828d

  • Size

    95KB

  • Sample

    250306-2xwwcazpz4

  • MD5

    57da45c67b2ce89876a2180cb6f1828d

  • SHA1

    b56eca1e18bb2e2aec2a47f238c0973bd755d001

  • SHA256

    676cfd6a513b17e1bc667e688beac7f40455b586a643c5b97355c575b857dc5d

  • SHA512

    b6e3aa31c74a5a7cb9332536fc49162f1b2ae78c24c664ea6b0fa2448226ef7b97ec93ad02860d6d10f6bdce18faef9aef24392deccdc75d6deb639084ee9b96

  • SSDEEP

    1536:IHFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8praiuXvd:IxS4jHS8q/3nTzePCwNUh4E9aiYvd

Malware Config

Targets

    • Target

      JaffaCakes118_57da45c67b2ce89876a2180cb6f1828d

    • Size

      95KB

    • MD5

      57da45c67b2ce89876a2180cb6f1828d

    • SHA1

      b56eca1e18bb2e2aec2a47f238c0973bd755d001

    • SHA256

      676cfd6a513b17e1bc667e688beac7f40455b586a643c5b97355c575b857dc5d

    • SHA512

      b6e3aa31c74a5a7cb9332536fc49162f1b2ae78c24c664ea6b0fa2448226ef7b97ec93ad02860d6d10f6bdce18faef9aef24392deccdc75d6deb639084ee9b96

    • SSDEEP

      1536:IHFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8praiuXvd:IxS4jHS8q/3nTzePCwNUh4E9aiYvd

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks