General
-
Target
JaffaCakes118_44f3b03691c782ab5eb10b0aa67589f0
-
Size
154KB
-
Sample
250303-ftexrsxzg1
-
MD5
44f3b03691c782ab5eb10b0aa67589f0
-
SHA1
b781e864d8cab63b93925295b2a72ca7bf35eed9
-
SHA256
26bbc0d96fc5d146b4cbfa4c5ba4b8748d90bcd0b2d1479fac3a2e59cb09369c
-
SHA512
4f440f1ea5041fb924320c8bf0a7a161111a5a035ba78f221533a6e25658f749d9218b89b551b135242151848dba4d4398b22d3230c6bc98614ba9dddc6cb8eb
-
SSDEEP
3072:vFCO50eOsHvRsIULrdDMKCyk2q0b2NhtVEXUh2nqzYw:vFKeOs7sdDM/sqwkEXUh2nqzn
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_44f3b03691c782ab5eb10b0aa67589f0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_44f3b03691c782ab5eb10b0aa67589f0.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_44f3b03691c782ab5eb10b0aa67589f0
-
Size
154KB
-
MD5
44f3b03691c782ab5eb10b0aa67589f0
-
SHA1
b781e864d8cab63b93925295b2a72ca7bf35eed9
-
SHA256
26bbc0d96fc5d146b4cbfa4c5ba4b8748d90bcd0b2d1479fac3a2e59cb09369c
-
SHA512
4f440f1ea5041fb924320c8bf0a7a161111a5a035ba78f221533a6e25658f749d9218b89b551b135242151848dba4d4398b22d3230c6bc98614ba9dddc6cb8eb
-
SSDEEP
3072:vFCO50eOsHvRsIULrdDMKCyk2q0b2NhtVEXUh2nqzYw:vFKeOs7sdDM/sqwkEXUh2nqzn
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-