General

  • Target

    JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe

  • Size

    150KB

  • Sample

    250305-ws3kfawjx9

  • MD5

    53158a67f720dadfbea207ae50aaf9fe

  • SHA1

    00d1e2b28f740016f1c8893f01c448afcb4f752d

  • SHA256

    e44881402128927dbf7de2101600303b1f086d7f2e2a08940868cccdefe5fbf5

  • SHA512

    d1aaffa4c5c8b71dd3a77c4b0ce15c76c1803d8a1acba706a6dfa707b3449448f227caefb6cc180e2b81cf9527881ebcb93c02a7639984112e476e0eebfb5f4a

  • SSDEEP

    3072:QaPwiR0gEGSd9GAYnnRdHN7nvCRSc9n39ooTID7jsXTcLd2jr:QwwiRCLGpnDN7KRSQn39oyq7HgP

Malware Config

Targets

    • Target

      JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe

    • Size

      150KB

    • MD5

      53158a67f720dadfbea207ae50aaf9fe

    • SHA1

      00d1e2b28f740016f1c8893f01c448afcb4f752d

    • SHA256

      e44881402128927dbf7de2101600303b1f086d7f2e2a08940868cccdefe5fbf5

    • SHA512

      d1aaffa4c5c8b71dd3a77c4b0ce15c76c1803d8a1acba706a6dfa707b3449448f227caefb6cc180e2b81cf9527881ebcb93c02a7639984112e476e0eebfb5f4a

    • SSDEEP

      3072:QaPwiR0gEGSd9GAYnnRdHN7nvCRSc9n39ooTID7jsXTcLd2jr:QwwiRCLGpnDN7KRSQn39oyq7HgP

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks