General

  • Target

    JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546

  • Size

    128KB

  • Sample

    250301-rvcdtatnw9

  • MD5

    3994d0ecada2b6315bd2ce9d1398f546

  • SHA1

    c2a6b5973830219f6543f5dd37c20bfe2373cf56

  • SHA256

    a84b257dbc7372386b6201aa17c8cc0e0e848a52509f95a169da7e961edfc263

  • SHA512

    1ab10d7eca8b8b073aee72313b83df7bd683e6ebbcb255fcd79e96f51509612d3e7d17e706fd820880881590683e0eebfcdd8b09371bd4fe44fc178269f02b8d

  • SSDEEP

    3072:R7e4vjk2YuEv+K+z6nPp8D+RDjxee7PK3gph0dofggCxfR:R7e4vjkTuEv+VecmMeT0w0dQtCr

Malware Config

Targets

    • Target

      JaffaCakes118_3994d0ecada2b6315bd2ce9d1398f546

    • Size

      128KB

    • MD5

      3994d0ecada2b6315bd2ce9d1398f546

    • SHA1

      c2a6b5973830219f6543f5dd37c20bfe2373cf56

    • SHA256

      a84b257dbc7372386b6201aa17c8cc0e0e848a52509f95a169da7e961edfc263

    • SHA512

      1ab10d7eca8b8b073aee72313b83df7bd683e6ebbcb255fcd79e96f51509612d3e7d17e706fd820880881590683e0eebfcdd8b09371bd4fe44fc178269f02b8d

    • SSDEEP

      3072:R7e4vjk2YuEv+K+z6nPp8D+RDjxee7PK3gph0dofggCxfR:R7e4vjkTuEv+VecmMeT0w0dQtCr

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks