ServiceMain
Behavioral task
behavioral1
Sample
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e
-
Size
109KB
-
MD5
54500d17c03abef7c0c0c4746d45ed9e
-
SHA1
149392eef8bd74264651c2dd3358e69865acc3e4
-
SHA256
2eb2fd29aadfcf6e8b3a0fd507f4c6b9655374e4728b8792bba97a1f290884f0
-
SHA512
0077d5e137d1016e940d756a490b48e56c9f1b40e2d1dacc22ea9b0aea7ee4a0677e4f82e03fc57984dba01669aef01b121f800a9a9bbbd4d23e4474e6882a69
-
SSDEEP
1536:tm4cgo72OAPGj4QOncz5OQXcsXzfCeUdd17AflOWa/MslOW2hJ6:k4nOAe9gcNOQXbXTCeUd7Aflo/MslsJ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e
Files
-
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll windows:4 windows x86 arch:x86
72d0ca669e18fbb5f2b6fc36f9d3ab7a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_snprintf
_errno
sprintf
strncpy
strncmp
wcslen
wcsrchr
_except_handler3
free
fopen
fseek
fread
fwrite
fputc
fclose
wcscat
_wcsnicmp
_wcsupr
mbstowcs
wcscpy
wcsstr
wcstombs
strchr
atoi
malloc
realloc
_CxxThrowException
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
__CxxFrameHandler
_strnicmp
wcschr
wcsncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
wcscmp
??2@YAPAXI@Z
kernel32
SetErrorMode
RaiseException
FreeLibrary
GetCurrentThreadId
GetProcAddress
OpenProcess
TerminateProcess
LocalSize
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetLocalTime
WriteFile
SetFilePointer
ReadFile
CreateFileW
GetFileSize
RemoveDirectoryW
LocalAlloc
FindFirstFileW
LocalReAlloc
lstrcmpW
FindNextFileW
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessW
GetFileAttributesW
CreateDirectoryW
DeleteFileW
WideCharToMultiByte
MoveFileW
GetModuleFileNameW
GetLastError
GetSystemDirectoryW
CreateEventW
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
InterlockedExchange
GetTempPathW
CancelIo
Sleep
lstrlenW
MultiByteToWideChar
Process32NextW
lstrcmpiW
Process32FirstW
CreateToolhelp32Snapshot
lstrcpyW
GetVersionExW
lstrcatW
GetCurrentProcess
GetWindowsDirectoryW
ReleaseMutex
OpenEventW
LoadLibraryA
CreateMutexA
GetTickCount
SetUnhandledExceptionFilter
FreeConsole
CopyFileW
msvfw32
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
msvcp60
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z
?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
Exports
Exports
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ