General

  • Target

    JaffaCakes118_50cefa40519163f69d83763282206abe

  • Size

    150KB

  • Sample

    250305-gpvyvszze1

  • MD5

    50cefa40519163f69d83763282206abe

  • SHA1

    9c413612d4f19f3c049ab3df61d81a025a7414e5

  • SHA256

    a1065afb321ea00ebed112f1cde90fdfc6f51c6e849f3909b13a0f70ec8b5dae

  • SHA512

    e8fb83ee33793b0406604f7fd166f2fc11156495fa9102ed7db5bffae370867477b168091a7d59a5a8c6323f63d0901abb3c00a31c839e689f7febed4d448bae

  • SSDEEP

    3072:gwFLv/9SNIItxH6As+4d5lp8ZIGOYjlh9X1xcIMxArGrW2+8YVp3pD1KYZ:HFLv/9SNIAxH6A743Y9RAxoFXJ51D

Malware Config

Targets

    • Target

      JaffaCakes118_50cefa40519163f69d83763282206abe

    • Size

      150KB

    • MD5

      50cefa40519163f69d83763282206abe

    • SHA1

      9c413612d4f19f3c049ab3df61d81a025a7414e5

    • SHA256

      a1065afb321ea00ebed112f1cde90fdfc6f51c6e849f3909b13a0f70ec8b5dae

    • SHA512

      e8fb83ee33793b0406604f7fd166f2fc11156495fa9102ed7db5bffae370867477b168091a7d59a5a8c6323f63d0901abb3c00a31c839e689f7febed4d448bae

    • SSDEEP

      3072:gwFLv/9SNIItxH6As+4d5lp8ZIGOYjlh9X1xcIMxArGrW2+8YVp3pD1KYZ:HFLv/9SNIAxH6A743Y9RAxoFXJ51D

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks