General

  • Target

    JaffaCakes118_59e86357ca3622c3e24a92a6e764c128

  • Size

    344KB

  • Sample

    250309-s1qztstzfv

  • MD5

    59e86357ca3622c3e24a92a6e764c128

  • SHA1

    f113451dc8ce1d69109f3b6d72f09b1bbe273268

  • SHA256

    541804add529cc2edd15a027e1f3370ce78d9c13d8fa4b15bdc19b8be1f5ff0b

  • SHA512

    92cd4cf7190616939fec99ba9e2f9bc8951a2b5bc3c249752bda407230e3e7feed9493b8200807ec86f0f9926ee436bd0e48559848ab951d340e9e31989a1969

  • SSDEEP

    6144:nINgekrKFVH0pwpM9NBiBd3wxQKwaaQMoTUK:nINgekrKFVH0pp9KdAxQKwBS

Malware Config

Targets

    • Target

      JaffaCakes118_59e86357ca3622c3e24a92a6e764c128

    • Size

      344KB

    • MD5

      59e86357ca3622c3e24a92a6e764c128

    • SHA1

      f113451dc8ce1d69109f3b6d72f09b1bbe273268

    • SHA256

      541804add529cc2edd15a027e1f3370ce78d9c13d8fa4b15bdc19b8be1f5ff0b

    • SHA512

      92cd4cf7190616939fec99ba9e2f9bc8951a2b5bc3c249752bda407230e3e7feed9493b8200807ec86f0f9926ee436bd0e48559848ab951d340e9e31989a1969

    • SSDEEP

      6144:nINgekrKFVH0pwpM9NBiBd3wxQKwaaQMoTUK:nINgekrKFVH0pp9KdAxQKwBS

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks