General

  • Target

    JaffaCakes118_47bc7aa23e046580e54a596f2301f73a

  • Size

    951KB

  • Sample

    250128-g2k97azpgp

  • MD5

    47bc7aa23e046580e54a596f2301f73a

  • SHA1

    19f375d03b5a2d1fc8c05f18ebc2bb17304f54f0

  • SHA256

    a35881e98b0df8d24eea1b78852ec6921ebcf0cf16bfeafd5da3453bdc4fc308

  • SHA512

    46733f43604a26e0eed422b2fb6187e694edeb0311ccf4fc2ac939d80544a172bd3c69112553c234a0d02ce63ac906244e09db7777af0ad7d2031fd44c272509

  • SSDEEP

    24576:hdufRX5CR3lXuOV2VfBEC1pGBWrvXABdswIo5Ao:hdUI3NNC1pHvwt

Malware Config

Targets

    • Target

      JaffaCakes118_47bc7aa23e046580e54a596f2301f73a

    • Size

      951KB

    • MD5

      47bc7aa23e046580e54a596f2301f73a

    • SHA1

      19f375d03b5a2d1fc8c05f18ebc2bb17304f54f0

    • SHA256

      a35881e98b0df8d24eea1b78852ec6921ebcf0cf16bfeafd5da3453bdc4fc308

    • SHA512

      46733f43604a26e0eed422b2fb6187e694edeb0311ccf4fc2ac939d80544a172bd3c69112553c234a0d02ce63ac906244e09db7777af0ad7d2031fd44c272509

    • SSDEEP

      24576:hdufRX5CR3lXuOV2VfBEC1pGBWrvXABdswIo5Ao:hdUI3NNC1pHvwt

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks