General

  • Target

    JaffaCakes118_5f7c0866651fbe19b04cfc2670c83d1d

  • Size

    184KB

  • Sample

    250310-q4ygzaxshy

  • MD5

    5f7c0866651fbe19b04cfc2670c83d1d

  • SHA1

    b8f5e39ffbc2fa6eb28a76b15a9f6cfd6b3190dc

  • SHA256

    d119192879c2a562bee13ae8e8c181b35467d158f05aba046faa59df9b39940c

  • SHA512

    acf30927f611831e33b50e2fe3c221589b245c19fbeb9b2a4f871a98c14444c1269e59db2b8da0f1528090c4b8e227843909f5f90b864b1b5a91c934d5bf7d15

  • SSDEEP

    3072:3YIS0M2rZfx0ELb0cqmQvc5JAdOZshlFrIxVudVFa2+MCGn1clvaF2J76:3xM2rH0EvQ6JAdBcVudQM5QaAJ+

Malware Config

Targets

    • Target

      JaffaCakes118_5f7c0866651fbe19b04cfc2670c83d1d

    • Size

      184KB

    • MD5

      5f7c0866651fbe19b04cfc2670c83d1d

    • SHA1

      b8f5e39ffbc2fa6eb28a76b15a9f6cfd6b3190dc

    • SHA256

      d119192879c2a562bee13ae8e8c181b35467d158f05aba046faa59df9b39940c

    • SHA512

      acf30927f611831e33b50e2fe3c221589b245c19fbeb9b2a4f871a98c14444c1269e59db2b8da0f1528090c4b8e227843909f5f90b864b1b5a91c934d5bf7d15

    • SSDEEP

      3072:3YIS0M2rZfx0ELb0cqmQvc5JAdOZshlFrIxVudVFa2+MCGn1clvaF2J76:3xM2rH0EvQ6JAdBcVudQM5QaAJ+

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks