General

  • Target

    JaffaCakes118_52fae45994528c635150fec30273f0b0

  • Size

    292KB

  • Sample

    250305-v249yst1gx

  • MD5

    52fae45994528c635150fec30273f0b0

  • SHA1

    10ab647a23ae304e7e45ec2006975122621175b8

  • SHA256

    3c26d8c54cee45d0cc0d58c629cf1aee4c0dcd1534ef956c484240bdf4ccbb99

  • SHA512

    fd4fa692b3f4b980ec41bb871874f8718f6e1fdfc43cc47f3511ddcec95c49c69a49b8822d2d8c4566cd8abe94a91088110beb4f1c11dcb315acb8ab0c350324

  • SSDEEP

    6144:pbS8Dee6ShFGDksOFilJzYcIbVwCuwtmnsxI5STCQjlM9:pO8K40DksoilJzYcIbVwCuwtmgI5Szj+

Malware Config

Targets

    • Target

      JaffaCakes118_52fae45994528c635150fec30273f0b0

    • Size

      292KB

    • MD5

      52fae45994528c635150fec30273f0b0

    • SHA1

      10ab647a23ae304e7e45ec2006975122621175b8

    • SHA256

      3c26d8c54cee45d0cc0d58c629cf1aee4c0dcd1534ef956c484240bdf4ccbb99

    • SHA512

      fd4fa692b3f4b980ec41bb871874f8718f6e1fdfc43cc47f3511ddcec95c49c69a49b8822d2d8c4566cd8abe94a91088110beb4f1c11dcb315acb8ab0c350324

    • SSDEEP

      6144:pbS8Dee6ShFGDksOFilJzYcIbVwCuwtmnsxI5STCQjlM9:pO8K40DksoilJzYcIbVwCuwtmgI5Szj+

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks