General

  • Target

    867c35c921ff72300b3567dcbe0825f1_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240810-r7b9kstgkq

  • MD5

    867c35c921ff72300b3567dcbe0825f1

  • SHA1

    0f9bd2936c1865a356d5968a543271753e464a50

  • SHA256

    0f19e3d235c5c6d519114c4f6a3f0d7e3509c37b95aaeb438ef7404176d12e24

  • SHA512

    28d972ba53541bd7377462e5ff70955fa4953d64b1ebdeb96b3500bfae1aa851288b8d669e73b61791874432a5b1df9f63d14b49b8a439a844ae1e6654d1d378

  • SSDEEP

    24576:LK80NYTR+caqLjbyRW1TZIDtQuMphNKylwoy8YGLvHUjlsU5XeNDq:Lv0NQ0caCvgWEQuM7QythL/0sge5q

Malware Config

Targets

    • Target

      867c35c921ff72300b3567dcbe0825f1_JaffaCakes118

    • Size

      1.3MB

    • MD5

      867c35c921ff72300b3567dcbe0825f1

    • SHA1

      0f9bd2936c1865a356d5968a543271753e464a50

    • SHA256

      0f19e3d235c5c6d519114c4f6a3f0d7e3509c37b95aaeb438ef7404176d12e24

    • SHA512

      28d972ba53541bd7377462e5ff70955fa4953d64b1ebdeb96b3500bfae1aa851288b8d669e73b61791874432a5b1df9f63d14b49b8a439a844ae1e6654d1d378

    • SSDEEP

      24576:LK80NYTR+caqLjbyRW1TZIDtQuMphNKylwoy8YGLvHUjlsU5XeNDq:Lv0NQ0caCvgWEQuM7QythL/0sge5q

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks