General

  • Target

    262a3d65ee164c547a7f54447464c47b_JaffaCakes118

  • Size

    815KB

  • Sample

    240704-zmvt7ayank

  • MD5

    262a3d65ee164c547a7f54447464c47b

  • SHA1

    86e1684153eccad2c07e26bd87d2aebef7fb6779

  • SHA256

    83c63881c74615713912233cd38bba032174ba605644d8e142f7bb207081ad93

  • SHA512

    960bf71dfc60627acfd3b6e9463f7f7458c8a6001bb69d327d03cf33bf08e2f85723bce24079da91b35ef5d99c600dd87e175fdaf03c236218a683fd555374f1

  • SSDEEP

    12288:J4vqmbCG6JrmL+qhzt7fz+7nBd1c87hmAd8G:J4vDbGFmBPzzsbc8b1

Malware Config

Targets

    • Target

      262a3d65ee164c547a7f54447464c47b_JaffaCakes118

    • Size

      815KB

    • MD5

      262a3d65ee164c547a7f54447464c47b

    • SHA1

      86e1684153eccad2c07e26bd87d2aebef7fb6779

    • SHA256

      83c63881c74615713912233cd38bba032174ba605644d8e142f7bb207081ad93

    • SHA512

      960bf71dfc60627acfd3b6e9463f7f7458c8a6001bb69d327d03cf33bf08e2f85723bce24079da91b35ef5d99c600dd87e175fdaf03c236218a683fd555374f1

    • SSDEEP

      12288:J4vqmbCG6JrmL+qhzt7fz+7nBd1c87hmAd8G:J4vDbGFmBPzzsbc8b1

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Modifies firewall policy service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks