General

  • Target

    JaffaCakes118_49044f3317228d55c847413f89e105bb

  • Size

    107KB

  • Sample

    250303-zc72rsyj16

  • MD5

    49044f3317228d55c847413f89e105bb

  • SHA1

    9c744beaf3f98efcf4249083aed90551940b8464

  • SHA256

    fc28d3c2a2c6fb864b321d3945418efc9304f6cc8d67bba35a91ea9fb0ea91cf

  • SHA512

    33d30d446d46a023520382b4758451e649bc9f4e4d1706e48dda8ec60e62a654c1045f79e02667ae58aad01c39923a89a118d2fb6c46730eb1d294cab9e2e378

  • SSDEEP

    3072:xsiRdvUIsH596/huzhHqnG78stvR7mPa3s+:BR+35U/ocnk3t5yPWs+

Malware Config

Targets

    • Target

      JaffaCakes118_49044f3317228d55c847413f89e105bb

    • Size

      107KB

    • MD5

      49044f3317228d55c847413f89e105bb

    • SHA1

      9c744beaf3f98efcf4249083aed90551940b8464

    • SHA256

      fc28d3c2a2c6fb864b321d3945418efc9304f6cc8d67bba35a91ea9fb0ea91cf

    • SHA512

      33d30d446d46a023520382b4758451e649bc9f4e4d1706e48dda8ec60e62a654c1045f79e02667ae58aad01c39923a89a118d2fb6c46730eb1d294cab9e2e378

    • SSDEEP

      3072:xsiRdvUIsH596/huzhHqnG78stvR7mPa3s+:BR+35U/ocnk3t5yPWs+

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks