General

  • Target

    JaffaCakes118_4fdcf75ba42f5350b3a1e8d2ecb4d340

  • Size

    156KB

  • Sample

    250305-bs5dtavms4

  • MD5

    4fdcf75ba42f5350b3a1e8d2ecb4d340

  • SHA1

    148ebb8f642c7edce306c1ad89c62917b6c2ca8f

  • SHA256

    93ffc3c83328bab684c2f41ca2664863ac06005c23f4eb3dc35091b0f8d25e9e

  • SHA512

    a7c46fc0011112749445941c31be8241a951ebb8401abead8124b8a49f42e2251a5808dbb2c10a7b3c900d7dc3ff291a487ad674b6dfae1f09f86de808399790

  • SSDEEP

    3072:0HkyYRjIULrdDMKCyk2q0b2NhtVEXUh2nqzzhh:0HxsdDM/sqwkEXUh2nqz7

Malware Config

Targets

    • Target

      JaffaCakes118_4fdcf75ba42f5350b3a1e8d2ecb4d340

    • Size

      156KB

    • MD5

      4fdcf75ba42f5350b3a1e8d2ecb4d340

    • SHA1

      148ebb8f642c7edce306c1ad89c62917b6c2ca8f

    • SHA256

      93ffc3c83328bab684c2f41ca2664863ac06005c23f4eb3dc35091b0f8d25e9e

    • SHA512

      a7c46fc0011112749445941c31be8241a951ebb8401abead8124b8a49f42e2251a5808dbb2c10a7b3c900d7dc3ff291a487ad674b6dfae1f09f86de808399790

    • SSDEEP

      3072:0HkyYRjIULrdDMKCyk2q0b2NhtVEXUh2nqzzhh:0HxsdDM/sqwkEXUh2nqz7

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks