General

  • Target

    JaffaCakes118_505cc4d4e611208733427336e0b82a50

  • Size

    150KB

  • Sample

    250305-ecvffsxrx9

  • MD5

    505cc4d4e611208733427336e0b82a50

  • SHA1

    74743b4ef02ea112b953ad3ceda4fd7f709d9851

  • SHA256

    0c99430cdb20bccc1d2230d477917f719b44131988b76785d13b59f9c2c8dac5

  • SHA512

    8af4f803acb77ef04f9831545ed1c5ac56c3d7c206afcc5f2df75f57e79672a14819bc215b284b16597f46c5cd753df805e14cfc763d773f7a0526b54a20ea96

  • SSDEEP

    3072:gwFLv/9SNIItxH6As+4d5lp8ZIGOYjlh9X1xcIMxArGrW2+8YVp3pD1KYX:HFLv/9SNIAxH6A743Y9RAxoFXJ51Z

Malware Config

Targets

    • Target

      JaffaCakes118_505cc4d4e611208733427336e0b82a50

    • Size

      150KB

    • MD5

      505cc4d4e611208733427336e0b82a50

    • SHA1

      74743b4ef02ea112b953ad3ceda4fd7f709d9851

    • SHA256

      0c99430cdb20bccc1d2230d477917f719b44131988b76785d13b59f9c2c8dac5

    • SHA512

      8af4f803acb77ef04f9831545ed1c5ac56c3d7c206afcc5f2df75f57e79672a14819bc215b284b16597f46c5cd753df805e14cfc763d773f7a0526b54a20ea96

    • SSDEEP

      3072:gwFLv/9SNIItxH6As+4d5lp8ZIGOYjlh9X1xcIMxArGrW2+8YVp3pD1KYX:HFLv/9SNIAxH6A743Y9RAxoFXJ51Z

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks