General

  • Target

    JaffaCakes118_4916ebcb1d4fc22bb0a9d8f0114b5edc

  • Size

    176KB

  • Sample

    250128-kxbfzatmhy

  • MD5

    4916ebcb1d4fc22bb0a9d8f0114b5edc

  • SHA1

    916cde50f58a8b94be7c29ae16965f5b194657c6

  • SHA256

    20c016f775260c8348004416a0757c716d76ce80328e98614fa52e699e232bc1

  • SHA512

    4b70d59ce3ba4f056059afbb365ea655cd7ed5616ca665cfd7fbdfbaf354c8aca384cbb20a8cad3600cf2ea64810c464ffe36132988bb37003e4a81cb1baa158

  • SSDEEP

    3072:RcYcYKEzcW526y6hs6PhwtqrorsVlkTEIcy1O4F3JhMWIknqX5d+vIjc8UW:RcBYKEz557e2VroYoTU4JOWnS5d+v0cu

Malware Config

Targets

    • Target

      JaffaCakes118_4916ebcb1d4fc22bb0a9d8f0114b5edc

    • Size

      176KB

    • MD5

      4916ebcb1d4fc22bb0a9d8f0114b5edc

    • SHA1

      916cde50f58a8b94be7c29ae16965f5b194657c6

    • SHA256

      20c016f775260c8348004416a0757c716d76ce80328e98614fa52e699e232bc1

    • SHA512

      4b70d59ce3ba4f056059afbb365ea655cd7ed5616ca665cfd7fbdfbaf354c8aca384cbb20a8cad3600cf2ea64810c464ffe36132988bb37003e4a81cb1baa158

    • SSDEEP

      3072:RcYcYKEzcW526y6hs6PhwtqrorsVlkTEIcy1O4F3JhMWIknqX5d+vIjc8UW:RcBYKEz557e2VroYoTU4JOWnS5d+v0cu

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks