General

  • Target

    JaffaCakes118_3b9d1a2900223810cc0168c0ebec303c

  • Size

    224KB

  • Sample

    250127-d39gmazkgm

  • MD5

    3b9d1a2900223810cc0168c0ebec303c

  • SHA1

    f2856930c0590a6fddc76b1eb520473bb31c34e3

  • SHA256

    7854d2a4eee142a4382472dfe90a063eb41ff1957e3186dedc146b070831e06f

  • SHA512

    7fcb2b40b0b4d19aa8750cc2bea364d63828960052ee9f16517f9dba399c502571ca09d8215f43f4892760c596be997d28c51cdc2ec121bc53ea993c7c23af10

  • SSDEEP

    6144:msOZtaqC2RShTSUd2SHZI+regn4ksb1LhK:MZtaqkNSUYSHZI+regn4kKs

Malware Config

Targets

    • Target

      JaffaCakes118_3b9d1a2900223810cc0168c0ebec303c

    • Size

      224KB

    • MD5

      3b9d1a2900223810cc0168c0ebec303c

    • SHA1

      f2856930c0590a6fddc76b1eb520473bb31c34e3

    • SHA256

      7854d2a4eee142a4382472dfe90a063eb41ff1957e3186dedc146b070831e06f

    • SHA512

      7fcb2b40b0b4d19aa8750cc2bea364d63828960052ee9f16517f9dba399c502571ca09d8215f43f4892760c596be997d28c51cdc2ec121bc53ea993c7c23af10

    • SSDEEP

      6144:msOZtaqC2RShTSUd2SHZI+regn4ksb1LhK:MZtaqkNSUYSHZI+regn4kKs

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks