General

  • Target

    JaffaCakes118_4dbc6827e3b6e23f859bcc01dab303c3

  • Size

    95KB

  • Sample

    250304-q7v61s1zbw

  • MD5

    4dbc6827e3b6e23f859bcc01dab303c3

  • SHA1

    1cee7788298d763f3a78c2e399c7571d018c550b

  • SHA256

    113d34df151742433db8c73da631613fa499094748835419b2448b290c525113

  • SHA512

    759cac96e10b6468e25df00889be6ac994b69cece9142adfd0f4089a72e1a3c168b9534a366c4f1d3d15867ce7f444275882d12da312a22d80c5eabb5950fabd

  • SSDEEP

    1536:BtAC8ESy6O2c04AxexVtCoNkPtBcR83ifYk+m8puRPusNk1/E+KgrnB:Btd8ESy6O2JhedCDtBK8EYk+PpuRPuse

Malware Config

Targets

    • Target

      JaffaCakes118_4dbc6827e3b6e23f859bcc01dab303c3

    • Size

      95KB

    • MD5

      4dbc6827e3b6e23f859bcc01dab303c3

    • SHA1

      1cee7788298d763f3a78c2e399c7571d018c550b

    • SHA256

      113d34df151742433db8c73da631613fa499094748835419b2448b290c525113

    • SHA512

      759cac96e10b6468e25df00889be6ac994b69cece9142adfd0f4089a72e1a3c168b9534a366c4f1d3d15867ce7f444275882d12da312a22d80c5eabb5950fabd

    • SSDEEP

      1536:BtAC8ESy6O2c04AxexVtCoNkPtBcR83ifYk+m8puRPusNk1/E+KgrnB:Btd8ESy6O2JhedCDtBK8EYk+PpuRPuse

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks