General

  • Target

    JaffaCakes118_4b91b54dafca433b8442e1aa4f11101c

  • Size

    247KB

  • Sample

    250304-gnfsjssp16

  • MD5

    4b91b54dafca433b8442e1aa4f11101c

  • SHA1

    e10313620f93a7fe6022a94e0935e5b58d2e2cc5

  • SHA256

    cf0152b5f317d9d82de78765eb7e1028ace7e5d3efe31e294813ddc60adea9d0

  • SHA512

    551e433a59c1f66c8700769f57522a7340bb2022f09964a91ee9e0491cf0bd3860da8894da309f69abdb4adf5d927ef82e22b710e7e6732a31589d32eebfaf3a

  • SSDEEP

    6144:ygTfvUslxrMicrfK7SmnkXMnf1QAJWqgOUeUx71s08jB:ffxMicbKnnk8nf1QG6psbB

Malware Config

Targets

    • Target

      JaffaCakes118_4b91b54dafca433b8442e1aa4f11101c

    • Size

      247KB

    • MD5

      4b91b54dafca433b8442e1aa4f11101c

    • SHA1

      e10313620f93a7fe6022a94e0935e5b58d2e2cc5

    • SHA256

      cf0152b5f317d9d82de78765eb7e1028ace7e5d3efe31e294813ddc60adea9d0

    • SHA512

      551e433a59c1f66c8700769f57522a7340bb2022f09964a91ee9e0491cf0bd3860da8894da309f69abdb4adf5d927ef82e22b710e7e6732a31589d32eebfaf3a

    • SSDEEP

      6144:ygTfvUslxrMicrfK7SmnkXMnf1QAJWqgOUeUx71s08jB:ffxMicbKnnk8nf1QG6psbB

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks