General

  • Target

    JaffaCakes118_4b0764166185753a0aca1663da221db0

  • Size

    116KB

  • Sample

    250304-eqcskazqv9

  • MD5

    4b0764166185753a0aca1663da221db0

  • SHA1

    7739a9d8b2ff89df74d9938ad6e1f85743deca5e

  • SHA256

    3a0ca4768db5f534506585983f0deab409842756806479e976a06590a3766466

  • SHA512

    ececcebf3a96d69019c2b858a20be5cd483a887246f143c331c8d2b92b22113c10f29ccfda77d1d81a63373d6377bde229e280c3374136856bca77d54059e108

  • SSDEEP

    3072:mIKicaxDGSoIFrICPGcmeOLMii7s5otn8+tmlfnsinKbznbDD:mXHa0IFrIVcmeOg85UtUfsjznD

Malware Config

Targets

    • Target

      JaffaCakes118_4b0764166185753a0aca1663da221db0

    • Size

      116KB

    • MD5

      4b0764166185753a0aca1663da221db0

    • SHA1

      7739a9d8b2ff89df74d9938ad6e1f85743deca5e

    • SHA256

      3a0ca4768db5f534506585983f0deab409842756806479e976a06590a3766466

    • SHA512

      ececcebf3a96d69019c2b858a20be5cd483a887246f143c331c8d2b92b22113c10f29ccfda77d1d81a63373d6377bde229e280c3374136856bca77d54059e108

    • SSDEEP

      3072:mIKicaxDGSoIFrICPGcmeOLMii7s5otn8+tmlfnsinKbznbDD:mXHa0IFrIVcmeOg85UtUfsjznD

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks