General

  • Target

    JaffaCakes118_564cc49e95149983e9ee2cb372d724fd

  • Size

    192KB

  • Sample

    250306-pbct5axygt

  • MD5

    564cc49e95149983e9ee2cb372d724fd

  • SHA1

    dc25b78b40ea3148bde039f14553a57933f852b4

  • SHA256

    8d166f01183dac0d4c5a28efaa25588017e7b85e8385d6df95837a215fa7a7ac

  • SHA512

    2336e4a844423115d72b36558182293cebd9eaf881e2f1c4d77ba762b6f617f9fe3bed92bb027c5bb6d941d26b4646a5bfe95e5fbba5f5c1a3f3abe94b12ae0a

  • SSDEEP

    3072:xEHwVBnWdcR7hygM7jNHwqAc0Hb0ZGlGPV6BLKw7i77Dgy:IwVBnWdcR7hyhHuq+b0Z907QDg

Malware Config

Targets

    • Target

      JaffaCakes118_564cc49e95149983e9ee2cb372d724fd

    • Size

      192KB

    • MD5

      564cc49e95149983e9ee2cb372d724fd

    • SHA1

      dc25b78b40ea3148bde039f14553a57933f852b4

    • SHA256

      8d166f01183dac0d4c5a28efaa25588017e7b85e8385d6df95837a215fa7a7ac

    • SHA512

      2336e4a844423115d72b36558182293cebd9eaf881e2f1c4d77ba762b6f617f9fe3bed92bb027c5bb6d941d26b4646a5bfe95e5fbba5f5c1a3f3abe94b12ae0a

    • SSDEEP

      3072:xEHwVBnWdcR7hygM7jNHwqAc0Hb0ZGlGPV6BLKw7i77Dgy:IwVBnWdcR7hyhHuq+b0Z907QDg

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks