General

  • Target

    JaffaCakes118_4c79f3ef767af60499725b3e907eb4dc

  • Size

    150KB

  • Sample

    250304-k85h7axly8

  • MD5

    4c79f3ef767af60499725b3e907eb4dc

  • SHA1

    7d8c14773afe9a457edd728fad01ee377390cd06

  • SHA256

    722bad8d9fdc2fb40273177925a5ce9bde0ae194642134a4097893318bfee51b

  • SHA512

    43d73c0fcaf5705f5c1c65b400d0b293a1e89c62eadf27aa355b17bf6b98c3319533ff75ccf64204f4c7dd19760e7d1f643bf2a6a25ab60ebe5fb15f9b6892ed

  • SSDEEP

    3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZ/:dkt0TSZkhWVvI+UupZTr5iSVrLmcq

Malware Config

Targets

    • Target

      JaffaCakes118_4c79f3ef767af60499725b3e907eb4dc

    • Size

      150KB

    • MD5

      4c79f3ef767af60499725b3e907eb4dc

    • SHA1

      7d8c14773afe9a457edd728fad01ee377390cd06

    • SHA256

      722bad8d9fdc2fb40273177925a5ce9bde0ae194642134a4097893318bfee51b

    • SHA512

      43d73c0fcaf5705f5c1c65b400d0b293a1e89c62eadf27aa355b17bf6b98c3319533ff75ccf64204f4c7dd19760e7d1f643bf2a6a25ab60ebe5fb15f9b6892ed

    • SSDEEP

      3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZ/:dkt0TSZkhWVvI+UupZTr5iSVrLmcq

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks