General

  • Target

    fe7630320000e354032c18fdae16af21_JaffaCakes118

  • Size

    52KB

  • Sample

    240929-nxvfmatanj

  • MD5

    fe7630320000e354032c18fdae16af21

  • SHA1

    c30062910c38ac924dd093cc57814d1ed987da48

  • SHA256

    298373492d1c069be7dc17748bd85b61d7292dc01d7744b8eb10fae087a5c66d

  • SHA512

    4a781a9d8beb63649236f5ed546e7bc6898d3d25428dc55d885d56426651246dfd2af9b1c26b8677b335cbd474bd7ff27db913a7ffb0c3b876556236e2961fb1

  • SSDEEP

    1536:a3idBevKuP4LCb/YiLZY9My7ye6Us9F9En:aydBeCubb/YiWZ7yeTs7+n

Malware Config

Targets

    • Target

      fe7630320000e354032c18fdae16af21_JaffaCakes118

    • Size

      52KB

    • MD5

      fe7630320000e354032c18fdae16af21

    • SHA1

      c30062910c38ac924dd093cc57814d1ed987da48

    • SHA256

      298373492d1c069be7dc17748bd85b61d7292dc01d7744b8eb10fae087a5c66d

    • SHA512

      4a781a9d8beb63649236f5ed546e7bc6898d3d25428dc55d885d56426651246dfd2af9b1c26b8677b335cbd474bd7ff27db913a7ffb0c3b876556236e2961fb1

    • SSDEEP

      1536:a3idBevKuP4LCb/YiLZY9My7ye6Us9F9En:aydBeCubb/YiWZ7yeTs7+n

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Server Software Component: Terminal Services DLL

MITRE ATT&CK Enterprise v15

Tasks