General

  • Target

    JaffaCakes118_55c305ecc05fb2657f152d199afb1144

  • Size

    235KB

  • Sample

    250306-k14xpavnt9

  • MD5

    55c305ecc05fb2657f152d199afb1144

  • SHA1

    e8a63c0568b2cfd59e7c492e183bab6f32cc5f1a

  • SHA256

    448a13783c1c499b0107c6f0d494908c7991931d59d37882e94d26cfe050b543

  • SHA512

    2a899d480c828b9258ce5ac3443c0860bf8e199ac7a2d275f804d760ae3ceeb4b7897d86dd6df5891c62cc7999bbd176cff8faabb0be5f69cccb06e73c13689b

  • SSDEEP

    6144:GphUyNq8ibIsUeIuiFFXYBmGFXfyHH+8kUB0:GvUyNq8OqeIuiemIyn+8O

Malware Config

Targets

    • Target

      JaffaCakes118_55c305ecc05fb2657f152d199afb1144

    • Size

      235KB

    • MD5

      55c305ecc05fb2657f152d199afb1144

    • SHA1

      e8a63c0568b2cfd59e7c492e183bab6f32cc5f1a

    • SHA256

      448a13783c1c499b0107c6f0d494908c7991931d59d37882e94d26cfe050b543

    • SHA512

      2a899d480c828b9258ce5ac3443c0860bf8e199ac7a2d275f804d760ae3ceeb4b7897d86dd6df5891c62cc7999bbd176cff8faabb0be5f69cccb06e73c13689b

    • SSDEEP

      6144:GphUyNq8ibIsUeIuiFFXYBmGFXfyHH+8kUB0:GvUyNq8OqeIuiemIyn+8O

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks