General

  • Target

    JaffaCakes118_57ef7426a5bc5d48787a3cd63ee0d781

  • Size

    188KB

  • Sample

    250306-3q4s2s1kz6

  • MD5

    57ef7426a5bc5d48787a3cd63ee0d781

  • SHA1

    1859a14d8cb3960e65a7693883e55035528ec790

  • SHA256

    3e61af253d78ff19426c6bd6617dc46d2b7affb1b9938cbceb03f23029f69e77

  • SHA512

    673a2ba6c0b2832a0cf50e1dc43360d84a84eccbe780d3f898850c9ece9e934517880916e0ffbbd27e17de78768298a12e1f47ee0c83ab23989a6755002c0643

  • SSDEEP

    3072:LcpQnW2GZcQX1fy+VTFx/xh86KfSl5hy5SYZI/:0QnW2GqQlfVdFx/U4YZ

Malware Config

Targets

    • Target

      JaffaCakes118_57ef7426a5bc5d48787a3cd63ee0d781

    • Size

      188KB

    • MD5

      57ef7426a5bc5d48787a3cd63ee0d781

    • SHA1

      1859a14d8cb3960e65a7693883e55035528ec790

    • SHA256

      3e61af253d78ff19426c6bd6617dc46d2b7affb1b9938cbceb03f23029f69e77

    • SHA512

      673a2ba6c0b2832a0cf50e1dc43360d84a84eccbe780d3f898850c9ece9e934517880916e0ffbbd27e17de78768298a12e1f47ee0c83ab23989a6755002c0643

    • SSDEEP

      3072:LcpQnW2GZcQX1fy+VTFx/xh86KfSl5hy5SYZI/:0QnW2GqQlfVdFx/U4YZ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks