General

  • Target

    806d1133e66fefba6b4589fe4c0daaea_JaffaCakes118

  • Size

    121KB

  • Sample

    241030-2eyl8asfjp

  • MD5

    806d1133e66fefba6b4589fe4c0daaea

  • SHA1

    8f8723fd6d9814d336088e15bd826cdbd807cff1

  • SHA256

    e82bc66b6cbf5feba3894c4bafc1933fb8f1d9c728be8caa5d0f8d9d04239fca

  • SHA512

    813b0cc72eaf05d06c18870775ec5a33adec84993d3dfe56164c7a62ddf196c1eafceb2dcd31a665356299d489b7d6e433dfc5c3f1cdeb044e4f589bc6a3b27d

  • SSDEEP

    3072:2m6XkoCyxsPN9dX8xcTTu2KyqIPjBwLxa/2Pfnai:2m6XkoCyxsPN9dXKcnMYP9f/2l

Malware Config

Targets

    • Target

      806d1133e66fefba6b4589fe4c0daaea_JaffaCakes118

    • Size

      121KB

    • MD5

      806d1133e66fefba6b4589fe4c0daaea

    • SHA1

      8f8723fd6d9814d336088e15bd826cdbd807cff1

    • SHA256

      e82bc66b6cbf5feba3894c4bafc1933fb8f1d9c728be8caa5d0f8d9d04239fca

    • SHA512

      813b0cc72eaf05d06c18870775ec5a33adec84993d3dfe56164c7a62ddf196c1eafceb2dcd31a665356299d489b7d6e433dfc5c3f1cdeb044e4f589bc6a3b27d

    • SSDEEP

      3072:2m6XkoCyxsPN9dX8xcTTu2KyqIPjBwLxa/2Pfnai:2m6XkoCyxsPN9dXKcnMYP9f/2l

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks