General

  • Target

    JaffaCakes118_3ebd5a9681d400f3022535546a4dd148

  • Size

    150KB

  • Sample

    250127-mqqcnawjdm

  • MD5

    3ebd5a9681d400f3022535546a4dd148

  • SHA1

    cf2f62052598b543e1ea7d522cbaa2a117741d3f

  • SHA256

    39c77bc7ac76e24bc64553febe2ad2e58df726a6275e8f883196549ef421cc8e

  • SHA512

    a66d0e1ad8b8a2ef7742503c069595f3e6449db5710e593a8366652fdad7be2c93eb168233ce01f26eb56c0d101a19dccd078e74a8a77a6c314ee88bc9e99cc5

  • SSDEEP

    3072:gwFLv/9SNIItxH6As+4d5lp8ZIGOYjlh9X1xcIMxArGrW2+8YVp3pD1KYf:HFLv/9SNIAxH6A743Y9RAxoFXJ51V

Malware Config

Targets

    • Target

      JaffaCakes118_3ebd5a9681d400f3022535546a4dd148

    • Size

      150KB

    • MD5

      3ebd5a9681d400f3022535546a4dd148

    • SHA1

      cf2f62052598b543e1ea7d522cbaa2a117741d3f

    • SHA256

      39c77bc7ac76e24bc64553febe2ad2e58df726a6275e8f883196549ef421cc8e

    • SHA512

      a66d0e1ad8b8a2ef7742503c069595f3e6449db5710e593a8366652fdad7be2c93eb168233ce01f26eb56c0d101a19dccd078e74a8a77a6c314ee88bc9e99cc5

    • SSDEEP

      3072:gwFLv/9SNIItxH6As+4d5lp8ZIGOYjlh9X1xcIMxArGrW2+8YVp3pD1KYf:HFLv/9SNIAxH6A743Y9RAxoFXJ51V

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks