General

  • Target

    JaffaCakes118_5eb811e99532fcb37465d60e2244c612

  • Size

    188KB

  • Sample

    250310-mypq4astcv

  • MD5

    5eb811e99532fcb37465d60e2244c612

  • SHA1

    36e5423403b8e64a014a5e520332c38398806087

  • SHA256

    bb659ec52102b801c75eb20ea9af4b6e44ec2313296321de86887ea383e26748

  • SHA512

    2f45ce3fc41d7b79e38554205dc86ca15fe4aaeadbbda00a9d1b95d2efa11bfeafc17685048beed15648b45bd5a45a0a7ea503c1c75eb1d7e68ef4460f5797d7

  • SSDEEP

    3072:eVQZnWL8v3z2uPoF3sRVs1h0HnyuARGf23gnBsQMATW5YmQ0/9W1Q+:TnWL8jDP3vy/Rd6BlMH+mj/9aQ

Malware Config

Targets

    • Target

      JaffaCakes118_5eb811e99532fcb37465d60e2244c612

    • Size

      188KB

    • MD5

      5eb811e99532fcb37465d60e2244c612

    • SHA1

      36e5423403b8e64a014a5e520332c38398806087

    • SHA256

      bb659ec52102b801c75eb20ea9af4b6e44ec2313296321de86887ea383e26748

    • SHA512

      2f45ce3fc41d7b79e38554205dc86ca15fe4aaeadbbda00a9d1b95d2efa11bfeafc17685048beed15648b45bd5a45a0a7ea503c1c75eb1d7e68ef4460f5797d7

    • SSDEEP

      3072:eVQZnWL8v3z2uPoF3sRVs1h0HnyuARGf23gnBsQMATW5YmQ0/9W1Q+:TnWL8jDP3vy/Rd6BlMH+mj/9aQ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks