General

  • Target

    JaffaCakes118_38f850bec72abfa51baa0b571418ef4f

  • Size

    61KB

  • Sample

    250301-pdv4gszydw

  • MD5

    38f850bec72abfa51baa0b571418ef4f

  • SHA1

    fbc84fd2f9d242674f6fe7e78669e329f3bdb5a5

  • SHA256

    b6d62cb80b7c99c972a4712f7f0e47752e282514f2be4863c5b8ffca5b022458

  • SHA512

    ac2f457c45c3427352d54cd869de1e9039432cf626fb7630fd0f3ed3bb70e338f1458d86e12d061ffb2a6bb4494afc8478f45867164d5168ff12b7ee67423820

  • SSDEEP

    1536:STDY//t8YWE8XJOQQAd5WZCH2C7OfpuAZ8X9jMMF:Kk3trmqAdm3ZZ8+s

Malware Config

Targets

    • Target

      JaffaCakes118_38f850bec72abfa51baa0b571418ef4f

    • Size

      61KB

    • MD5

      38f850bec72abfa51baa0b571418ef4f

    • SHA1

      fbc84fd2f9d242674f6fe7e78669e329f3bdb5a5

    • SHA256

      b6d62cb80b7c99c972a4712f7f0e47752e282514f2be4863c5b8ffca5b022458

    • SHA512

      ac2f457c45c3427352d54cd869de1e9039432cf626fb7630fd0f3ed3bb70e338f1458d86e12d061ffb2a6bb4494afc8478f45867164d5168ff12b7ee67423820

    • SSDEEP

      1536:STDY//t8YWE8XJOQQAd5WZCH2C7OfpuAZ8X9jMMF:Kk3trmqAdm3ZZ8+s

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Event Triggered Execution: AppCert DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks