General

  • Target

    9f13222e90452545ac1e434d6bbcd0b4_JaffaCakes118

  • Size

    150KB

  • Sample

    241126-bzs95axkcv

  • MD5

    9f13222e90452545ac1e434d6bbcd0b4

  • SHA1

    f9c3a9c8f8798e325b2685e019f39c7d6dea922c

  • SHA256

    f229292f07e91f0e9f28ae4b1f989d969c2d1922c66e29c6e37af56fdb04f012

  • SHA512

    113fb4341b7ea437aea478bd8ea2309e5ccc6ecd8b390dd3ce8df7353174b867a13e39ad687825d06185cac5bdc47a0a31af434fdfdc9984f46c37f5b53711ae

  • SSDEEP

    3072:0lctl8STlrLKnRVWh0q8ntMviU9tv+SRtcFcoeYkmkCc:0UlJTJLKXq8ntMviU9tmSRqiAkm4

Malware Config

Targets

    • Target

      9f13222e90452545ac1e434d6bbcd0b4_JaffaCakes118

    • Size

      150KB

    • MD5

      9f13222e90452545ac1e434d6bbcd0b4

    • SHA1

      f9c3a9c8f8798e325b2685e019f39c7d6dea922c

    • SHA256

      f229292f07e91f0e9f28ae4b1f989d969c2d1922c66e29c6e37af56fdb04f012

    • SHA512

      113fb4341b7ea437aea478bd8ea2309e5ccc6ecd8b390dd3ce8df7353174b867a13e39ad687825d06185cac5bdc47a0a31af434fdfdc9984f46c37f5b53711ae

    • SSDEEP

      3072:0lctl8STlrLKnRVWh0q8ntMviU9tv+SRtcFcoeYkmkCc:0UlJTJLKXq8ntMviU9tmSRqiAkm4

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks