General

  • Target

    JaffaCakes118_5d719d8d73199792d17b0744552a9d34

  • Size

    235KB

  • Sample

    250310-gqhpxsvnx8

  • MD5

    5d719d8d73199792d17b0744552a9d34

  • SHA1

    f985cf42e201e75fe02d493f7f3466c92e75f206

  • SHA256

    02577711bfa38cd6fba201dfb85d54b4b8a1bba2bfafe38eec1319c2fc219dd5

  • SHA512

    b18426f57a0ade026a4dac29f856295ebc5b6ac26f215858981ed945f87366c7343a35b7a5f185f0bedfeacea228a1ace1f3bbfcb3301e90493c09c520a5472d

  • SSDEEP

    6144:zphUyNq8ibIsUeIuiFFXYBmGFXfyHH+8kUBq:zvUyNq8OqeIuiemIyn+8Y

Malware Config

Targets

    • Target

      JaffaCakes118_5d719d8d73199792d17b0744552a9d34

    • Size

      235KB

    • MD5

      5d719d8d73199792d17b0744552a9d34

    • SHA1

      f985cf42e201e75fe02d493f7f3466c92e75f206

    • SHA256

      02577711bfa38cd6fba201dfb85d54b4b8a1bba2bfafe38eec1319c2fc219dd5

    • SHA512

      b18426f57a0ade026a4dac29f856295ebc5b6ac26f215858981ed945f87366c7343a35b7a5f185f0bedfeacea228a1ace1f3bbfcb3301e90493c09c520a5472d

    • SSDEEP

      6144:zphUyNq8ibIsUeIuiFFXYBmGFXfyHH+8kUBq:zvUyNq8OqeIuiemIyn+8Y

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks