General

  • Target

    JaffaCakes118_3c060c2b76b7c089e755297b9c057375

  • Size

    74KB

  • Sample

    250301-2edbaavvbz

  • MD5

    3c060c2b76b7c089e755297b9c057375

  • SHA1

    57f130235e8963c85f3d5b92285f67edaabd8bd6

  • SHA256

    8eead0f0af5510317193074ddc27855639bddaa47b993bb9a6c720d12516ac66

  • SHA512

    2ae93835e7e26409282d49c8acf34b81e3ae83df117cad5364b24fe17912dc09ff8839a6c066480b8527958797095f41f50ce3453c328e8ec7992edc6de5f3aa

  • SSDEEP

    1536:R2XN82yFpOqYIBMa/VhVjBQEd20rXak8bc3CbW9jURbncEX0bEwMQF0NiyHhMB:RgK2ypOqlBx9FBq9bcyS9jubc7bXnF08

Malware Config

Targets

    • Target

      JaffaCakes118_3c060c2b76b7c089e755297b9c057375

    • Size

      74KB

    • MD5

      3c060c2b76b7c089e755297b9c057375

    • SHA1

      57f130235e8963c85f3d5b92285f67edaabd8bd6

    • SHA256

      8eead0f0af5510317193074ddc27855639bddaa47b993bb9a6c720d12516ac66

    • SHA512

      2ae93835e7e26409282d49c8acf34b81e3ae83df117cad5364b24fe17912dc09ff8839a6c066480b8527958797095f41f50ce3453c328e8ec7992edc6de5f3aa

    • SSDEEP

      1536:R2XN82yFpOqYIBMa/VhVjBQEd20rXak8bc3CbW9jURbncEX0bEwMQF0NiyHhMB:RgK2ypOqlBx9FBq9bcyS9jubc7bXnF08

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks