General

  • Target

    eae0f060e9cdbbfcc339be22f8f2dfcc_JaffaCakes118

  • Size

    407KB

  • Sample

    240919-jlztraxgjf

  • MD5

    eae0f060e9cdbbfcc339be22f8f2dfcc

  • SHA1

    a06562b70bd216c0a4b0127e1aa3b4c81f12d3e8

  • SHA256

    fcc1ceb396524d78f9f38d32491cefbef7115dbf75d33fe9e517f1efa8677231

  • SHA512

    257bd1bfe2e996cfc38724dab6bcca192497901604105cc6716cfb612d5856c652a082164158f9e515e77e3be5861797e970075b040b85af9ba4595370ea70a1

  • SSDEEP

    6144:qBk/uxfMb0kAKtF2idZecnl20lHRxp3geN+x704wANEHMywbC3FiAHQz:ok/uVIRXF3Z4mxxr+x79w7HLj3FiM6

Malware Config

Targets

    • Target

      eae0f060e9cdbbfcc339be22f8f2dfcc_JaffaCakes118

    • Size

      407KB

    • MD5

      eae0f060e9cdbbfcc339be22f8f2dfcc

    • SHA1

      a06562b70bd216c0a4b0127e1aa3b4c81f12d3e8

    • SHA256

      fcc1ceb396524d78f9f38d32491cefbef7115dbf75d33fe9e517f1efa8677231

    • SHA512

      257bd1bfe2e996cfc38724dab6bcca192497901604105cc6716cfb612d5856c652a082164158f9e515e77e3be5861797e970075b040b85af9ba4595370ea70a1

    • SSDEEP

      6144:qBk/uxfMb0kAKtF2idZecnl20lHRxp3geN+x704wANEHMywbC3FiAHQz:ok/uVIRXF3Z4mxxr+x79w7HLj3FiM6

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks