General

  • Target

    JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb

  • Size

    1.4MB

  • Sample

    250304-wx71qaxny3

  • MD5

    4eeca5401a0b3f222374edd11bc3fbbb

  • SHA1

    c4d2be8c18b799756e4a15267c2071d4a6ad6c1b

  • SHA256

    cc36b7ea338099ef2829f72e5c435a4554a1c06e1eef30fc9e59982022cf7d86

  • SHA512

    46915011543a8a0a139e9d99987612fe8e5e8dd0953b056bfdbfc980f422147d7a5747d1a71d5e44d22e751c58ee4cef80ecadcc6efbf5eb21d6cce7b1a03d03

  • SSDEEP

    24576:z977daDkp58ZQ1dGlDUx1gjC6qFwMM7m33xkYRG6MozaB3nqKMEMYsBjM:p74DY8ZDDUxaC9wM3B46Mo2dqZEuBjM

Malware Config

Targets

    • Target

      JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb

    • Size

      1.4MB

    • MD5

      4eeca5401a0b3f222374edd11bc3fbbb

    • SHA1

      c4d2be8c18b799756e4a15267c2071d4a6ad6c1b

    • SHA256

      cc36b7ea338099ef2829f72e5c435a4554a1c06e1eef30fc9e59982022cf7d86

    • SHA512

      46915011543a8a0a139e9d99987612fe8e5e8dd0953b056bfdbfc980f422147d7a5747d1a71d5e44d22e751c58ee4cef80ecadcc6efbf5eb21d6cce7b1a03d03

    • SSDEEP

      24576:z977daDkp58ZQ1dGlDUx1gjC6qFwMM7m33xkYRG6MozaB3nqKMEMYsBjM:p74DY8ZDDUxaC9wM3B46Mo2dqZEuBjM

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks