General

  • Target

    JaffaCakes118_55fe2a4b9a75eeed31c19f9ef7c19e55

  • Size

    95KB

  • Sample

    250306-mg6y2swtd1

  • MD5

    55fe2a4b9a75eeed31c19f9ef7c19e55

  • SHA1

    d448cf6db82246e23efe2718c40e4b9ae23d7b22

  • SHA256

    0c71ddd274298e2a05b48acaa278704fdc842b3dcdc941891668161e8cdff50e

  • SHA512

    5abbaa1fbaa3a00f1b6e589392acaff2a3e6738d0b9a396df6a558dc20ab8d25f6ac072970aa2fc2f0570c4c696cb89afe0ee2a28d103fb81881b85058e1dfa1

  • SSDEEP

    1536:qKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prTPLyrBdACLmDx7kEOR:qQS4jHS8q/3nTzePCwNUh4E9TPerBdAc

Malware Config

Targets

    • Target

      JaffaCakes118_55fe2a4b9a75eeed31c19f9ef7c19e55

    • Size

      95KB

    • MD5

      55fe2a4b9a75eeed31c19f9ef7c19e55

    • SHA1

      d448cf6db82246e23efe2718c40e4b9ae23d7b22

    • SHA256

      0c71ddd274298e2a05b48acaa278704fdc842b3dcdc941891668161e8cdff50e

    • SHA512

      5abbaa1fbaa3a00f1b6e589392acaff2a3e6738d0b9a396df6a558dc20ab8d25f6ac072970aa2fc2f0570c4c696cb89afe0ee2a28d103fb81881b85058e1dfa1

    • SSDEEP

      1536:qKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prTPLyrBdACLmDx7kEOR:qQS4jHS8q/3nTzePCwNUh4E9TPerBdAc

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks