General

  • Target

    JaffaCakes118_5565046f16c5302b690fc1a780f43ef3

  • Size

    349KB

  • Sample

    250306-htjbassmz8

  • MD5

    5565046f16c5302b690fc1a780f43ef3

  • SHA1

    204183aaf3ca8a636018e9d7a0f51bb94b2b8647

  • SHA256

    229f20c65d20cea7e02a2fc4210067f40446d127921c4ca7dcbe943b59f7f955

  • SHA512

    754103feb4bc863a94edbd4fb173c6ac68d3f4e788f71488acc4e7827a7159fca68f498101b48742118c91fe82a247067326dad7520fd8e79c485f6164610fb4

  • SSDEEP

    6144:T4RgeQLkpcQSE7M1loXnuUEF9GCpiQ+0uE:T4RgeQAqxEI1aX/it2c

Malware Config

Targets

    • Target

      JaffaCakes118_5565046f16c5302b690fc1a780f43ef3

    • Size

      349KB

    • MD5

      5565046f16c5302b690fc1a780f43ef3

    • SHA1

      204183aaf3ca8a636018e9d7a0f51bb94b2b8647

    • SHA256

      229f20c65d20cea7e02a2fc4210067f40446d127921c4ca7dcbe943b59f7f955

    • SHA512

      754103feb4bc863a94edbd4fb173c6ac68d3f4e788f71488acc4e7827a7159fca68f498101b48742118c91fe82a247067326dad7520fd8e79c485f6164610fb4

    • SSDEEP

      6144:T4RgeQLkpcQSE7M1loXnuUEF9GCpiQ+0uE:T4RgeQAqxEI1aX/it2c

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks