General

  • Target

    JaffaCakes118_5d544e23a7097a65484eb603d1023725

  • Size

    274KB

  • Sample

    250310-f9f5rst1gs

  • MD5

    5d544e23a7097a65484eb603d1023725

  • SHA1

    05114a9c0ba9ae21e76cb4459ccb5480d4dfdb55

  • SHA256

    3e8a83545e78b52259daa304bfe39aa0e5cabfea341d49543992bcde7efb763f

  • SHA512

    28f8173cc6a43e1a9b16d279f193ca4e84aade3de0b9ddddbdfdc788fa6d08abb7806979118abc1c0218ba21fc234856c33c5ed6a95ca436a7acdcaf611ce3e0

  • SSDEEP

    6144:gqWPVPoEA71IdU39U3B2+3yyQIyTJbTmKJS1lQzQG/d:gqWPZoEO98H3DbyTg4QG1

Malware Config

Targets

    • Target

      JaffaCakes118_5d544e23a7097a65484eb603d1023725

    • Size

      274KB

    • MD5

      5d544e23a7097a65484eb603d1023725

    • SHA1

      05114a9c0ba9ae21e76cb4459ccb5480d4dfdb55

    • SHA256

      3e8a83545e78b52259daa304bfe39aa0e5cabfea341d49543992bcde7efb763f

    • SHA512

      28f8173cc6a43e1a9b16d279f193ca4e84aade3de0b9ddddbdfdc788fa6d08abb7806979118abc1c0218ba21fc234856c33c5ed6a95ca436a7acdcaf611ce3e0

    • SSDEEP

      6144:gqWPVPoEA71IdU39U3B2+3yyQIyTJbTmKJS1lQzQG/d:gqWPZoEO98H3DbyTg4QG1

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks