General
-
Target
4a77887bfb15cd97964730f743d8d7d2_JaffaCakes118
-
Size
2.0MB
-
Sample
240715-twfhzasbla
-
MD5
4a77887bfb15cd97964730f743d8d7d2
-
SHA1
2946916719060e789cfeb70b06a1a19eae1dcb8c
-
SHA256
678bddf3e9e0e5fbcd7d0d61d3cc944740c334380aad164e46d3fb5252406864
-
SHA512
4d3ee6b2b513a0c2d0207ce7860d8305c2cab79108e539d5d0b863b8d3846e738286159a326953434fd351ca00988bb1559c3c3cbcaab4795484151c7a23ba9c
-
SSDEEP
49152:LbQ9tUbdU0GUvqrwILQiTZ+W49gAK0vyhUkwkur:LEC1GUqLQuZyM0vyGkt
Behavioral task
behavioral1
Sample
4a77887bfb15cd97964730f743d8d7d2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a77887bfb15cd97964730f743d8d7d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
4a77887bfb15cd97964730f743d8d7d2_JaffaCakes118
-
Size
2.0MB
-
MD5
4a77887bfb15cd97964730f743d8d7d2
-
SHA1
2946916719060e789cfeb70b06a1a19eae1dcb8c
-
SHA256
678bddf3e9e0e5fbcd7d0d61d3cc944740c334380aad164e46d3fb5252406864
-
SHA512
4d3ee6b2b513a0c2d0207ce7860d8305c2cab79108e539d5d0b863b8d3846e738286159a326953434fd351ca00988bb1559c3c3cbcaab4795484151c7a23ba9c
-
SSDEEP
49152:LbQ9tUbdU0GUvqrwILQiTZ+W49gAK0vyhUkwkur:LEC1GUqLQuZyM0vyGkt
Score10/10-
Gh0st RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Server Software Component: Terminal Services DLL
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-