General

  • Target

    JaffaCakes118_40515a611ff39d7fcddad9c6eb990ed7

  • Size

    119KB

  • Sample

    250127-refrasspar

  • MD5

    40515a611ff39d7fcddad9c6eb990ed7

  • SHA1

    694e7790c526a96c8a1e5cab6ae379be699e81fe

  • SHA256

    bd2179a4be6862cab8803d4907f0620e3deca6ee90199581138deb59c83f5c5c

  • SHA512

    87acd6b540656a1976df42ece533dde9e8de55a64794fea1fbbee6a5c89f7b56f7f7d862864b604bdfebd8202a3ecdabcf7bc65c3f868b6d3ab4abdc3e806cd2

  • SSDEEP

    3072:Q+RGr/IKKNwhTPu3FwuBcpS7k7iv8rP8IP8d:bwr/IK1PyZBYZGv8rP8Iw

Malware Config

Targets

    • Target

      JaffaCakes118_40515a611ff39d7fcddad9c6eb990ed7

    • Size

      119KB

    • MD5

      40515a611ff39d7fcddad9c6eb990ed7

    • SHA1

      694e7790c526a96c8a1e5cab6ae379be699e81fe

    • SHA256

      bd2179a4be6862cab8803d4907f0620e3deca6ee90199581138deb59c83f5c5c

    • SHA512

      87acd6b540656a1976df42ece533dde9e8de55a64794fea1fbbee6a5c89f7b56f7f7d862864b604bdfebd8202a3ecdabcf7bc65c3f868b6d3ab4abdc3e806cd2

    • SSDEEP

      3072:Q+RGr/IKKNwhTPu3FwuBcpS7k7iv8rP8IP8d:bwr/IK1PyZBYZGv8rP8Iw

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

MITRE ATT&CK Enterprise v15

Tasks