General

  • Target

    JaffaCakes118_60ac8d1d1dab910ea8482856dd87e1b5

  • Size

    95KB

  • Sample

    250310-ww4xnstzaw

  • MD5

    60ac8d1d1dab910ea8482856dd87e1b5

  • SHA1

    5bc7956bdcc612ee140f7a813230b1f4bdddd9d1

  • SHA256

    22e198688165496c82dced60fd7c40b988f8b8655fd1d5216a7888abae31d03d

  • SHA512

    8bb36c5fc202c1d8bbce9ce4f7b4bc5c925c6dcd468b95533a3b7fd810d555713615c2e054446766e03f06f4646bce69851a7e8fdc2524392e681a09f3cfef85

  • SSDEEP

    1536:NHFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prRj9kIW:NxS4jHS8q/3nTzePCwNUh4E9RpkIW

Malware Config

Targets

    • Target

      JaffaCakes118_60ac8d1d1dab910ea8482856dd87e1b5

    • Size

      95KB

    • MD5

      60ac8d1d1dab910ea8482856dd87e1b5

    • SHA1

      5bc7956bdcc612ee140f7a813230b1f4bdddd9d1

    • SHA256

      22e198688165496c82dced60fd7c40b988f8b8655fd1d5216a7888abae31d03d

    • SHA512

      8bb36c5fc202c1d8bbce9ce4f7b4bc5c925c6dcd468b95533a3b7fd810d555713615c2e054446766e03f06f4646bce69851a7e8fdc2524392e681a09f3cfef85

    • SSDEEP

      1536:NHFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prRj9kIW:NxS4jHS8q/3nTzePCwNUh4E9RpkIW

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks