General

  • Target

    JaffaCakes118_4d27d809fa2ee20883e49e8bdc9d2150

  • Size

    912KB

  • Sample

    250304-nxltgsy1hy

  • MD5

    4d27d809fa2ee20883e49e8bdc9d2150

  • SHA1

    64d216af04a3043fb817f848fbc97be62fe15958

  • SHA256

    f4cc9e1e3dd233cd9fc38f14524787fa9cb15630a68351f33de9c9087eebb44d

  • SHA512

    d19e405214f8bc2a7eecb80bc46061b8cb7fd0e362667745f44285babd1452e427130accd6921cacef920656762160602cd8fdb7c1634db67d50fd14a00fd51e

  • SSDEEP

    24576:wEJ17LwBnlm+jSyMhLvhoqQ5gJFCcEwIxSOlgfo:hJ1IQQSFhLezqFGwIxRg

Malware Config

Targets

    • Target

      JaffaCakes118_4d27d809fa2ee20883e49e8bdc9d2150

    • Size

      912KB

    • MD5

      4d27d809fa2ee20883e49e8bdc9d2150

    • SHA1

      64d216af04a3043fb817f848fbc97be62fe15958

    • SHA256

      f4cc9e1e3dd233cd9fc38f14524787fa9cb15630a68351f33de9c9087eebb44d

    • SHA512

      d19e405214f8bc2a7eecb80bc46061b8cb7fd0e362667745f44285babd1452e427130accd6921cacef920656762160602cd8fdb7c1634db67d50fd14a00fd51e

    • SSDEEP

      24576:wEJ17LwBnlm+jSyMhLvhoqQ5gJFCcEwIxSOlgfo:hJ1IQQSFhLezqFGwIxRg

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks