General

  • Target

    JaffaCakes118_3c3cb8730c61979b804dd52782eac170

  • Size

    176KB

  • Sample

    250301-25wkjswly7

  • MD5

    3c3cb8730c61979b804dd52782eac170

  • SHA1

    f7bc9f7b4df4ccdcdb3170844fda6828253ce99f

  • SHA256

    de952c80c707b509d79d11bd96ae1db878e18169a277e5b9d2eb4809646fbb1b

  • SHA512

    1d2cd8785b9bfe6dfdcfeab9f90f1d0e18e35a1f2eb12249ead47c2afd4b978bfffe6aa8f8e2604b8b7dc637c2a7111a8e253bad89fc486fd29fc12d5bde9065

  • SSDEEP

    3072:R+QGB8zNmVMYSxKeobNKcf09c8wfCL7uQ/IpRoutyVX6Ao0:R+NB8YutgeoJc9XL5WoSyFt

Malware Config

Targets

    • Target

      JaffaCakes118_3c3cb8730c61979b804dd52782eac170

    • Size

      176KB

    • MD5

      3c3cb8730c61979b804dd52782eac170

    • SHA1

      f7bc9f7b4df4ccdcdb3170844fda6828253ce99f

    • SHA256

      de952c80c707b509d79d11bd96ae1db878e18169a277e5b9d2eb4809646fbb1b

    • SHA512

      1d2cd8785b9bfe6dfdcfeab9f90f1d0e18e35a1f2eb12249ead47c2afd4b978bfffe6aa8f8e2604b8b7dc637c2a7111a8e253bad89fc486fd29fc12d5bde9065

    • SSDEEP

      3072:R+QGB8zNmVMYSxKeobNKcf09c8wfCL7uQ/IpRoutyVX6Ao0:R+NB8YutgeoJc9XL5WoSyFt

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks