General

  • Target

    JaffaCakes118_55ded9bd9e12ad04e15717d92365a258

  • Size

    95KB

  • Sample

    250306-lmhyqswjz2

  • MD5

    55ded9bd9e12ad04e15717d92365a258

  • SHA1

    d38e33dc662677e242836df848cfa0698069584b

  • SHA256

    0c2a866840db38ad25d601078e184aa6461da2e7a5b7e7f8eb9cdb60db91361a

  • SHA512

    c263318f16a461875e19f1755ba1483df0afb1282989d5a6a6b2bfdbdbcdea06ec376d1b1f7255de04d800f5f1e547faa060f353cf5faa1509ee3602216443eb

  • SSDEEP

    1536:cJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prSynvajHhWx:cfS4jHS8q/3nTzePCwNUh4E9SyCjHhWx

Malware Config

Targets

    • Target

      JaffaCakes118_55ded9bd9e12ad04e15717d92365a258

    • Size

      95KB

    • MD5

      55ded9bd9e12ad04e15717d92365a258

    • SHA1

      d38e33dc662677e242836df848cfa0698069584b

    • SHA256

      0c2a866840db38ad25d601078e184aa6461da2e7a5b7e7f8eb9cdb60db91361a

    • SHA512

      c263318f16a461875e19f1755ba1483df0afb1282989d5a6a6b2bfdbdbcdea06ec376d1b1f7255de04d800f5f1e547faa060f353cf5faa1509ee3602216443eb

    • SSDEEP

      1536:cJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prSynvajHhWx:cfS4jHS8q/3nTzePCwNUh4E9SyCjHhWx

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks