General

  • Target

    JaffaCakes118_479cbaa427e1a2d78eec239b2361c99a

  • Size

    260KB

  • Sample

    250128-gsh4gazjg1

  • MD5

    479cbaa427e1a2d78eec239b2361c99a

  • SHA1

    a2981d0743a5f48c309ac1f10d41eda102564b99

  • SHA256

    50fafb79798fd6c4d3a7a85376c05d44234de6f30846dd215f2b632804cd6b74

  • SHA512

    b18aa1980f6457f4870aa7e6970e2f62208b0c0d726b1645072d1f6b8325b55747ab3cd583ccf4760a62b3ca793ff66bfe3641afa0487a4c0eed6ec2955ac429

  • SSDEEP

    6144:Ii8Dee6ShFGDksOFilBOvjuuDkYJCduMVx:z8K40DksoilqjuukndPj

Malware Config

Targets

    • Target

      JaffaCakes118_479cbaa427e1a2d78eec239b2361c99a

    • Size

      260KB

    • MD5

      479cbaa427e1a2d78eec239b2361c99a

    • SHA1

      a2981d0743a5f48c309ac1f10d41eda102564b99

    • SHA256

      50fafb79798fd6c4d3a7a85376c05d44234de6f30846dd215f2b632804cd6b74

    • SHA512

      b18aa1980f6457f4870aa7e6970e2f62208b0c0d726b1645072d1f6b8325b55747ab3cd583ccf4760a62b3ca793ff66bfe3641afa0487a4c0eed6ec2955ac429

    • SSDEEP

      6144:Ii8Dee6ShFGDksOFilBOvjuuDkYJCduMVx:z8K40DksoilqjuukndPj

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Server Software Component: Terminal Services DLL

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks