General

  • Target

    JaffaCakes118_4529b93720394baf3244f06c995a9d96

  • Size

    165KB

  • Sample

    250303-gjyskazks9

  • MD5

    4529b93720394baf3244f06c995a9d96

  • SHA1

    c195059bf931cefb9eae9bc2d164aea13e9c1a50

  • SHA256

    b8a2bc2014d5ff09b5740ecf8c510750863c7994d5dde616e06f547783f91815

  • SHA512

    800df45b4f6616838dd692c8a79bc4d305ffd8eebfd6268987b4e4ce7d31c25abc5b4bb77327b6863022c1c5bb0c1e2f94fcea997e5c025469f55f8290043c92

  • SSDEEP

    3072:N3C6T6TjtRZo0j1oWOQ/TpBpiRgjPHKXWqT5w8pS+DTtivlY+82yQMX:N2Xo0hoWOQrpjiRgmWWwYDsvlY+82Fq

Malware Config

Targets

    • Target

      JaffaCakes118_4529b93720394baf3244f06c995a9d96

    • Size

      165KB

    • MD5

      4529b93720394baf3244f06c995a9d96

    • SHA1

      c195059bf931cefb9eae9bc2d164aea13e9c1a50

    • SHA256

      b8a2bc2014d5ff09b5740ecf8c510750863c7994d5dde616e06f547783f91815

    • SHA512

      800df45b4f6616838dd692c8a79bc4d305ffd8eebfd6268987b4e4ce7d31c25abc5b4bb77327b6863022c1c5bb0c1e2f94fcea997e5c025469f55f8290043c92

    • SSDEEP

      3072:N3C6T6TjtRZo0j1oWOQ/TpBpiRgjPHKXWqT5w8pS+DTtivlY+82yQMX:N2Xo0hoWOQrpjiRgmWWwYDsvlY+82Fq

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks