General

  • Target

    JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4

  • Size

    150KB

  • Sample

    250304-jbpk2atxfz

  • MD5

    4bfc13c1512f1a8668c9bd86024747d4

  • SHA1

    d782af875d43802e9512ed0c90bde843854ed4de

  • SHA256

    4128727c52e7bda7339d0c4d5362e087db4db6177222685a992e21ae4ef5871b

  • SHA512

    96f454533721f7e53eb5389899dfb4be7977a65b634e767b5b1eaed4e46e3c9d95f4464cb7dd1c95e0e4af287aa3f619b4f5e411fd74976ba8f0b12716ef74bc

  • SSDEEP

    3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZI:dkt0TSZkhWVvI+UupZTr5iSVrLmc5

Malware Config

Targets

    • Target

      JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4

    • Size

      150KB

    • MD5

      4bfc13c1512f1a8668c9bd86024747d4

    • SHA1

      d782af875d43802e9512ed0c90bde843854ed4de

    • SHA256

      4128727c52e7bda7339d0c4d5362e087db4db6177222685a992e21ae4ef5871b

    • SHA512

      96f454533721f7e53eb5389899dfb4be7977a65b634e767b5b1eaed4e46e3c9d95f4464cb7dd1c95e0e4af287aa3f619b4f5e411fd74976ba8f0b12716ef74bc

    • SSDEEP

      3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZI:dkt0TSZkhWVvI+UupZTr5iSVrLmc5

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks