General

  • Target

    JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246

  • Size

    107KB

  • Sample

    250127-my4v1svmf1

  • MD5

    3ed4ec7ffbbaa7cedf86e7da640ea246

  • SHA1

    42d5cc980b54addcf4c14b348449d478c6403a5a

  • SHA256

    afa25d5b2f16e3e0b5b7c1afae2b27c2cea267d6b1f42e1188c5116bd5d60866

  • SHA512

    bbd0f973ec0a702149e79195b22576cacc88cbca75c08eb01e5a9e3933288cf5cb36e04c0643efdb0c10b47d0ba4fecfa0c9d5d22bddee5266ca8c7225e33c9b

  • SSDEEP

    3072:iosj8C4iSyGPQYgO6gxr+I58PUcfJZsppERaTA4Tw++J+T:i9YiSyGoYgO6gxr+I5elf44RQXw+a8

Malware Config

Targets

    • Target

      JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246

    • Size

      107KB

    • MD5

      3ed4ec7ffbbaa7cedf86e7da640ea246

    • SHA1

      42d5cc980b54addcf4c14b348449d478c6403a5a

    • SHA256

      afa25d5b2f16e3e0b5b7c1afae2b27c2cea267d6b1f42e1188c5116bd5d60866

    • SHA512

      bbd0f973ec0a702149e79195b22576cacc88cbca75c08eb01e5a9e3933288cf5cb36e04c0643efdb0c10b47d0ba4fecfa0c9d5d22bddee5266ca8c7225e33c9b

    • SSDEEP

      3072:iosj8C4iSyGPQYgO6gxr+I58PUcfJZsppERaTA4Tw++J+T:i9YiSyGoYgO6gxr+I5elf44RQXw+a8

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks