General

  • Target

    JaffaCakes118_558140ea2c04f37d95c72a43073c1027

  • Size

    1.4MB

  • Sample

    250306-jh8x9aswhz

  • MD5

    558140ea2c04f37d95c72a43073c1027

  • SHA1

    9fc3bf1496f519ede537e8820de522ebf2c041d8

  • SHA256

    3a11eb449ae8e2880a403251f7270ede453a7d424e5297e44810cc43c6dbccc8

  • SHA512

    9f248722a3fdedf627fe568b1a26212dcd9922fd8ba947d074fde031fb32c5fd42dbdbd9b7416ab46fb4b60103cd7bccd256937c1a3576c97879e595bd63c3cc

  • SSDEEP

    24576:vyq+e/hqP14vf6Xj3u2EJiqMdJWQb7EmXqYdchgaZL+gy35T5n7KMLDn58:6qM4vcj+2EwaQb7HFdc/ZrypTRKMHn58

Malware Config

Targets

    • Target

      JaffaCakes118_558140ea2c04f37d95c72a43073c1027

    • Size

      1.4MB

    • MD5

      558140ea2c04f37d95c72a43073c1027

    • SHA1

      9fc3bf1496f519ede537e8820de522ebf2c041d8

    • SHA256

      3a11eb449ae8e2880a403251f7270ede453a7d424e5297e44810cc43c6dbccc8

    • SHA512

      9f248722a3fdedf627fe568b1a26212dcd9922fd8ba947d074fde031fb32c5fd42dbdbd9b7416ab46fb4b60103cd7bccd256937c1a3576c97879e595bd63c3cc

    • SSDEEP

      24576:vyq+e/hqP14vf6Xj3u2EJiqMdJWQb7EmXqYdchgaZL+gy35T5n7KMLDn58:6qM4vcj+2EwaQb7HFdc/ZrypTRKMHn58

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks