General

  • Target

    b6d6b23e1d0aae268a74cf5d43202f3d_JaffaCakes118

  • Size

    155KB

  • Sample

    240822-jddxbaycln

  • MD5

    b6d6b23e1d0aae268a74cf5d43202f3d

  • SHA1

    5b0d8bf4637995aaf54767e52ca1a1d27b031be6

  • SHA256

    bca7e90a839e552b03a61a74f0b18023b94963ed17b8557e902d6fe8ddd021e7

  • SHA512

    603e0627cbf2efc48bd4038767ed45de04cbec38864be24d03f4037731cb6cc36818559824694a32e8f53fa5292fad2e025bcaa5bccbe6b04b7c8033645077d8

  • SSDEEP

    3072:sJuGnYhTbK80khbOvf9xHwm1PXBmXZFeA28pM6EdePl9dehiv80P80Cnp8d6kL:sJueTk1ONdwaWB28edeP/deUv80P80Ak

Malware Config

Targets

    • Target

      b6d6b23e1d0aae268a74cf5d43202f3d_JaffaCakes118

    • Size

      155KB

    • MD5

      b6d6b23e1d0aae268a74cf5d43202f3d

    • SHA1

      5b0d8bf4637995aaf54767e52ca1a1d27b031be6

    • SHA256

      bca7e90a839e552b03a61a74f0b18023b94963ed17b8557e902d6fe8ddd021e7

    • SHA512

      603e0627cbf2efc48bd4038767ed45de04cbec38864be24d03f4037731cb6cc36818559824694a32e8f53fa5292fad2e025bcaa5bccbe6b04b7c8033645077d8

    • SSDEEP

      3072:sJuGnYhTbK80khbOvf9xHwm1PXBmXZFeA28pM6EdePl9dehiv80P80Cnp8d6kL:sJueTk1ONdwaWB28edeP/deUv80P80Ak

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks