General

  • Target

    JaffaCakes118_5f179e11e9d6549a7f6c52750b34937a

  • Size

    260KB

  • Sample

    250310-pgvl5atzhs

  • MD5

    5f179e11e9d6549a7f6c52750b34937a

  • SHA1

    9aa75b7f61916456b34136393f3c74e667b55caf

  • SHA256

    0ffc6b3118b85f1f6c21caf8902f4c6e3473480914702b57b1e85c2de246524c

  • SHA512

    1ef752683011a60d9970cc60571f500c96f18bfa7cd9026ed7a33d17dfef5410f0d31914f3ce03473f08f2fd4385d662e4c3d24a9e9a190731f977028cc38b29

  • SSDEEP

    6144:VjvlkVhgecmAT3Ye77MLp3QoXnuUEF9GCpiQjpKP/:V7lkVhgectYe7ItfX/itbk/

Malware Config

Targets

    • Target

      JaffaCakes118_5f179e11e9d6549a7f6c52750b34937a

    • Size

      260KB

    • MD5

      5f179e11e9d6549a7f6c52750b34937a

    • SHA1

      9aa75b7f61916456b34136393f3c74e667b55caf

    • SHA256

      0ffc6b3118b85f1f6c21caf8902f4c6e3473480914702b57b1e85c2de246524c

    • SHA512

      1ef752683011a60d9970cc60571f500c96f18bfa7cd9026ed7a33d17dfef5410f0d31914f3ce03473f08f2fd4385d662e4c3d24a9e9a190731f977028cc38b29

    • SSDEEP

      6144:VjvlkVhgecmAT3Ye77MLp3QoXnuUEF9GCpiQjpKP/:V7lkVhgectYe7ItfX/itbk/

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks