General

  • Target

    JaffaCakes118_3db371bce5060e1d42e76ad8f7cd886d

  • Size

    247KB

  • Sample

    250127-ka134szkct

  • MD5

    3db371bce5060e1d42e76ad8f7cd886d

  • SHA1

    e24f085968f0f1aab6d3bfca35ff5ff5a1e50c12

  • SHA256

    58f565f9af16f75b6e9532dbf5ad9b75cc360b3507af57360346bc3e747ee934

  • SHA512

    01b2250c308a474483d5aabfb0fdfc19dc92c85b38a0a00c35bc7c17c357db1c985f4654ae152a29a1ff5fae482fd7c27f3f4baea47466cb3919b859d5c7ab07

  • SSDEEP

    6144:ygTfvUslxrMicrfK7SmnkXMnf1QAJWqgOUeUx71s08j9:ffxMicbKnnk8nf1QG6psb9

Malware Config

Targets

    • Target

      JaffaCakes118_3db371bce5060e1d42e76ad8f7cd886d

    • Size

      247KB

    • MD5

      3db371bce5060e1d42e76ad8f7cd886d

    • SHA1

      e24f085968f0f1aab6d3bfca35ff5ff5a1e50c12

    • SHA256

      58f565f9af16f75b6e9532dbf5ad9b75cc360b3507af57360346bc3e747ee934

    • SHA512

      01b2250c308a474483d5aabfb0fdfc19dc92c85b38a0a00c35bc7c17c357db1c985f4654ae152a29a1ff5fae482fd7c27f3f4baea47466cb3919b859d5c7ab07

    • SSDEEP

      6144:ygTfvUslxrMicrfK7SmnkXMnf1QAJWqgOUeUx71s08j9:ffxMicbKnnk8nf1QG6psb9

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks