General

  • Target

    4a77887bfb15cd97964730f743d8d7d2_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240715-twfhzasbla

  • MD5

    4a77887bfb15cd97964730f743d8d7d2

  • SHA1

    2946916719060e789cfeb70b06a1a19eae1dcb8c

  • SHA256

    678bddf3e9e0e5fbcd7d0d61d3cc944740c334380aad164e46d3fb5252406864

  • SHA512

    4d3ee6b2b513a0c2d0207ce7860d8305c2cab79108e539d5d0b863b8d3846e738286159a326953434fd351ca00988bb1559c3c3cbcaab4795484151c7a23ba9c

  • SSDEEP

    49152:LbQ9tUbdU0GUvqrwILQiTZ+W49gAK0vyhUkwkur:LEC1GUqLQuZyM0vyGkt

Malware Config

Targets

    • Target

      4a77887bfb15cd97964730f743d8d7d2_JaffaCakes118

    • Size

      2.0MB

    • MD5

      4a77887bfb15cd97964730f743d8d7d2

    • SHA1

      2946916719060e789cfeb70b06a1a19eae1dcb8c

    • SHA256

      678bddf3e9e0e5fbcd7d0d61d3cc944740c334380aad164e46d3fb5252406864

    • SHA512

      4d3ee6b2b513a0c2d0207ce7860d8305c2cab79108e539d5d0b863b8d3846e738286159a326953434fd351ca00988bb1559c3c3cbcaab4795484151c7a23ba9c

    • SSDEEP

      49152:LbQ9tUbdU0GUvqrwILQiTZ+W49gAK0vyhUkwkur:LEC1GUqLQuZyM0vyGkt

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks