General
-
Target
4cdd8a1e35b69ac641523db139e401af_JaffaCakes118
-
Size
34KB
-
Sample
240516-y39slseg3s
-
MD5
4cdd8a1e35b69ac641523db139e401af
-
SHA1
5907953486632332fc8524eaa18040fa4034e666
-
SHA256
a997a35f57b80da86eeb8fbf74fe82b3dc44adac2f4e85364c250a59a677540c
-
SHA512
e4b68cd5459cb33c703f40a09d4a0f6cb9962478ccc6720b46a8656bb427f0f4c44b827719ffc626a1857157fc4da24e8fa30e55437f833d3f6aef02bd96f4a2
-
SSDEEP
768:iw/iOWTK3JWhOM/qZh7UJGcZ/RzdUKRFvnbcuyD7UHLAj:RQK52fqZSIAZS2nouy88j
Behavioral task
behavioral1
Sample
4cdd8a1e35b69ac641523db139e401af_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4cdd8a1e35b69ac641523db139e401af_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
gh0strat
post.f2pool.info
Targets
-
-
Target
4cdd8a1e35b69ac641523db139e401af_JaffaCakes118
-
Size
34KB
-
MD5
4cdd8a1e35b69ac641523db139e401af
-
SHA1
5907953486632332fc8524eaa18040fa4034e666
-
SHA256
a997a35f57b80da86eeb8fbf74fe82b3dc44adac2f4e85364c250a59a677540c
-
SHA512
e4b68cd5459cb33c703f40a09d4a0f6cb9962478ccc6720b46a8656bb427f0f4c44b827719ffc626a1857157fc4da24e8fa30e55437f833d3f6aef02bd96f4a2
-
SSDEEP
768:iw/iOWTK3JWhOM/qZh7UJGcZ/RzdUKRFvnbcuyD7UHLAj:RQK52fqZSIAZS2nouy88j
Score10/10-
Gh0st RAT payload
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a Windows Service
-
Drops file in System32 directory
-